Sciweavers

112 search results - page 17 / 23
» Trained to accept
Sort
View
IWCMC
2010
ACM
13 years 9 months ago
On the use of random neural networks for traffic matrix estimation in large-scale IP networks
Despite a large body of literature and methods devoted to the Traffic Matrix (TM) estimation problem, the inference of traffic flows volume from aggregated data still represents a ...
Pedro Casas, Sandrine Vaton
KDD
2010
ACM
287views Data Mining» more  KDD 2010»
13 years 9 months ago
Designing efficient cascaded classifiers: tradeoff between accuracy and cost
We propose a method to train a cascade of classifiers by simultaneously optimizing all its stages. The approach relies on the idea of optimizing soft cascades. In particular, inst...
Vikas C. Raykar, Balaji Krishnapuram, Shipeng Yu
COLING
1994
13 years 8 months ago
A "not-so-shallow" parser for collocational analysis
Collocational analysis is the basis of many studies on lexical acquisition. Collocations are extracted from corpora using more or less shallow processing techniques, that span from...
Roberto Basili, Maria Teresa Pazienza, Paola Velar...
NAR
2007
235views more  NAR 2007»
13 years 7 months ago
PAR-3D: a server to predict protein active site residues
PAR-3D (http://sunserver.cdfd.org.in:8080/protease /PAR_3D/index.html) is a web-based tool that exploits the fact that relative juxtaposition of active site residues is a conserve...
Kshama Goyal, Debasisa Mohanty, Shekhar C. Mande
PAMI
2007
121views more  PAMI 2007»
13 years 7 months ago
Person Authentication Using Brainwaves (EEG) and Maximum A Posteriori Model Adaptation
— In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is uniq...
Sébastien Marcel, José del R. Mill&a...