Sciweavers

388 search results - page 71 / 78
» The covering number in learning theory
Sort
View
DMIN
2006
134views Data Mining» more  DMIN 2006»
13 years 8 months ago
Hyper-Rectangular and k-Nearest-Neighbor Models in Stochastic Discrimination
The stochastic discrimination (SD) theory considers learning as building models of uniform coverage over data distributions. Despite successful trials of the derived SD method in s...
Iryna Skrypnyk, Tin Kam Ho
IADIS
2003
13 years 8 months ago
A Classification System for Tracking the Adoption of it by GPS in Rural Australia
This paper proposes an investigation of sociotechnical factors affecting the adoption of information technology (IT) by General Practitioners (GPs), for the purposes of the develo...
Stephen Burgess, Paul Darbyshire, Carmine Sellino,...
CDC
2008
IEEE
145views Control Systems» more  CDC 2008»
13 years 7 months ago
Necessary and sufficient conditions for success of the nuclear norm heuristic for rank minimization
Minimizing the rank of a matrix subject to constraints is a challenging problem that arises in many applications in control theory, machine learning, and discrete geometry. This c...
Benjamin Recht, Weiyu Xu, Babak Hassibi
CORR
2010
Springer
124views Education» more  CORR 2010»
13 years 7 months ago
Mimicking the Behaviour of Idiotypic AIS Robot Controllers Using Probabilistic Systems
Previous work has shown that robot navigation systems that employ an architecture based upon the idiotypic network theory of the immune system have an advantage over control techn...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh