Sciweavers

562 search results - page 108 / 113
» Supervised Machine Learning: A Review of Classification Tech...
Sort
View
JSAC
2010
146views more  JSAC 2010»
13 years 2 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
RSCTC
2000
Springer
185views Fuzzy Logic» more  RSCTC 2000»
13 years 11 months ago
A Comparison of Several Approaches to Missing Attribute Values in Data Mining
: In the paper nine different approaches to missing attribute values are presented and compared. Ten input data files were used to investigate the performance of the nine methods t...
Jerzy W. Grzymala-Busse, Ming Hu
CCS
2010
ACM
13 years 5 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
WCRE
2010
IEEE
13 years 5 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle
ICPR
2004
IEEE
14 years 8 months ago
Feature Subset Selection using ICA for Classifying Emphysema in HRCT Images
Feature subset selection, applied as a pre-processing step to machine learning, is valuable in dimensionality reduction, eliminating irrelevant data and improving classifier perfo...
Mithun Nagendra Prasad, Arcot Sowmya, Inge Koch