Sciweavers

98 search results - page 6 / 20
» Swarming Behavior Using Probabilistic Roadmap Techniques
Sort
View
GECCO
2007
Springer
256views Optimization» more  GECCO 2007»
14 years 1 months ago
A particle swarm optimization approach for estimating parameter confidence regions
Point estimates of the parameters in real world models convey valuable information about the actual system. However, parameter comparisons and/or statistical inference requires de...
Praveen Koduru, Stephen Welch, Sanjoy Das
ICDM
2008
IEEE
126views Data Mining» more  ICDM 2008»
14 years 2 months ago
Detecting Suspicious Behavior in Surveillance Images
We introduce a novel technique to detect anomalies in images. The notion of normalcy is given by a baseline of images, under the assumption that the majority of such images is nor...
Daniel Barbará, Carlotta Domeniconi, Zoran ...
WISE
2005
Springer
14 years 1 months ago
A Web Recommendation Technique Based on Probabilistic Latent Semantic Analysis
Web transaction data between Web visitors and Web functionalities usually convey user task-oriented behavior pattern. Mining such type of clickstream data will lead to capture usag...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
CEC
2009
IEEE
14 years 2 months ago
An adaptive learning particle swarm optimizer for function optimization
— Traditional particle swarm optimization (PSO) suffers from the premature convergence problem, which usually results in PSO being trapped in local optima. This paper presents an...
Changhe Li, Shengxiang Yang
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 4 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan