Sciweavers

822 search results - page 16 / 165
» Visualization techniques utilizing the sensitivity analysis ...
Sort
View
CORR
2000
Springer
84views Education» more  CORR 2000»
13 years 7 months ago
Robust Classification for Imprecise Environments
In real-world environments it usually is difficult to specify target operating conditions precisely, for example, target misclassification costs. This uncertainty makes building ro...
Foster J. Provost, Tom Fawcett
ICCBR
2005
Springer
14 years 1 months ago
Re-using Implicit Knowledge in Short-Term Information Profiles for Context-Sensitive Tasks
Typically, case-based recommender systems recommend single items to the on-line customer. In this paper we introduce the idea of recommending a user-defined collection of items whe...
Conor Hayes, Paolo Avesani, Emiliano Baldo, Padrai...
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
QOFIS
2004
Springer
14 years 1 months ago
Evaluating the Utility of Media-Dependent FEC in VoIP Flows
In this paper, we present an analysis of the impact of using media–dependent Forward Error Correction (FEC) in VoIP flows over the Internet. This error correction mechanism cons...
Gerardo Rubino, Martín Varela
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
13 years 11 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...