Sciweavers

8381 search results - page 1666 / 1677
» The security of machine learning
Sort
View
ICRA
2010
IEEE
178views Robotics» more  ICRA 2010»
13 years 5 months ago
Autonomous operation of novel elevators for robot navigation
— Although robot navigation in indoor environments has achieved great success, robots are unable to fully navigate these spaces without the ability to operate elevators, includin...
Ellen Klingbeil, Blake Carpenter, Olga Russakovsky...
IJPRAI
2010
151views more  IJPRAI 2010»
13 years 5 months ago
Structure-Embedded AUC-SVM
: AUC-SVM directly maximizes the area under the ROC curve (AUC) through minimizing its hinge loss relaxation, and the decision function is determined by those support vector sample...
Yunyun Wang, Songcan Chen, Hui Xue
JMS
2010
90views more  JMS 2010»
13 years 5 months ago
Prediction of Clinical Conditions after Coronary Bypass Surgery using Dynamic Data Analysis
This work studies the impact of using dynamic information as features in a machine learning algorithm for the prediction task of classifying critically ill patients in two classes ...
Kristien Van Loon, Fabián Güiza, Geert...
MMS
2010
13 years 5 months ago
Asynchronous reflections: theory and practice in the design of multimedia mirror systems
-- In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing p...
Wei Zhang, Bo Begole, Maurice Chu
PRL
2010
159views more  PRL 2010»
13 years 5 months ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith
« Prev « First page 1666 / 1677 Last » Next »