Sciweavers

331 search results - page 35 / 67
» Vicinal Risk Minimization
Sort
View
ICIP
2006
IEEE
14 years 9 months ago
Behavior Forensics in Traitors within Traitors for Scalable Multimedia
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
K. J. Ray Liu, H. Vicky Zhao
CHI
2005
ACM
14 years 8 months ago
Chit chat club: bridging virtual and physical space for social interaction
In this work, we create an audio-video link via an interactive sculpture to facilitate casual, sociable communication between two remote spaces. This communication installation wa...
Karrie Karahalios, Kelly Dobson
CIKM
2009
Springer
14 years 2 months ago
Learning to rank from Bayesian decision inference
Ranking is a key problem in many information retrieval (IR) applications, such as document retrieval and collaborative filtering. In this paper, we address the issue of learning ...
Jen-Wei Kuo, Pu-Jen Cheng, Hsin-Min Wang
GECCO
2003
Springer
114views Optimization» more  GECCO 2003»
14 years 23 days ago
Genetic Algorithm for Supply Planning Optimization under Uncertain Demand
Supply planning optimization is one of the most important issues for manufacturers and distributors. Supply is planned to meet the future demand. Under the uncertainty involved in ...
Masaru Tezuka, Masahiro Hiji
GECCO
2009
Springer
121views Optimization» more  GECCO 2009»
14 years 5 days ago
Using memetic algorithms to improve portfolio performance in static and dynamic trading scenarios
The Portfolio Optimization problem consists of the selection of a group of assets to a long-term fund in order to minimize the risk and maximize the return of the investment. This...
Claus de Castro Aranha, Hitoshi Iba