Sciweavers

2229 search results - page 39 / 446
» The Case for Grounding Databases
Sort
View
KDD
1998
ACM
185views Data Mining» more  KDD 1998»
14 years 3 months ago
Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection
Verylarge databases with skewedclass distributions and non-unlformcost per error are not uncommonin real-world data mining tasks. Wedevised a multi-classifier meta-learningapproac...
Philip K. Chan, Salvatore J. Stolfo
ISCC
2006
IEEE
134views Communications» more  ISCC 2006»
14 years 4 months ago
A Proposed Framework for Calibration of Available Bandwidth Estimation Tools
Examining the validity or accuracy of proposed available bandwidth estimation tools remains a challenging problem. A common approach consists of evaluating a newly developed tool ...
Joel Sommers, Paul Barford, Walter Willinger
JEI
2008
128views more  JEI 2008»
13 years 10 months ago
Practical use of receiver operating characteristic analysis to assess the performances of defect detection algorithms
Defect detection in images is a current task in quality control and is often integrated in partially or fully automated systems. Assessing the performances of defect detection algo...
Yann Le Meur, Jean-Michel Vignolle, Jocelyn Chanus...
PAMI
2010
238views more  PAMI 2010»
13 years 9 months ago
Tracking Motion, Deformation, and Texture Using Conditionally Gaussian Processes
—We present a generative model and inference algorithm for 3D nonrigid object tracking. The model, which we call G-flow, enables the joint inference of 3D position, orientation, ...
Tim K. Marks, John R. Hershey, Javier R. Movellan
BMVC
2010
13 years 9 months ago
Person Identification using Shadow Analysis
We introduce a novel person identification method for a surveillance system of much wider area than conventional systems using CCTV cameras. In the proposed system, we install cam...
Yumi Iwashita, Adrian Stoica, Ryo Kurazume