Sciweavers

2229 search results - page 39 / 446
» The Case for Grounding Databases
Sort
View
KDD
1998
ACM
185views Data Mining» more  KDD 1998»
15 years 7 months ago
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection
Verylarge databases with skewedclass distributions and non-unlformcost per error are not uncommonin real-world data mining tasks. Wedevised a multi-classifier meta-learningapproac...
Philip K. Chan, Salvatore J. Stolfo
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
15 years 9 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
JEI
2008
128views more  JEI 2008»
15 years 2 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
PAMI
2010
238views more  PAMI 2010»
15 years 1 months ago
Tracking Motion, Deformation, and Texture Using Conditionally Gaussian Processes
—We present a generative model and inference algorithm for 3D nonrigid object tracking. The model, which we call G-flow, enables the joint inference of 3D position, orientation, ...
Tim K. Marks, John R. Hershey, Javier R. Movellan
BMVC
2010
15 years 1 months ago
Person Identification using Shadow Analysis
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
Yumi Iwashita, Adrian Stoica, Ryo Kurazume