Sciweavers

IJCV
2000
133views more  IJCV 2000»
13 years 9 months ago
Heteroscedastic Regression in Computer Vision: Problems with Bilinear Constraint
We present an algorithm to estimate the parameters of a linear model in the presence of heteroscedastic noise, i.e., each data point having a different covariance matrix. The algor...
Yoram Leedan, Peter Meer
DATAMINE
2002
155views more  DATAMINE 2002»
13 years 9 months ago
Efficient Adaptive-Support Association Rule Mining for Recommender Systems
Collaborative recommender systems allow personalization for e-commerce by exploiting similarities and dissimilarities among customers' preferences. We investigate the use of a...
Weiyang Lin, Sergio A. Alvarez, Carolina Ruiz
COMCOM
2007
145views more  COMCOM 2007»
13 years 9 months ago
Jointly rate and power control in contention based MultiHop Wireless Networks
This paper presents a new algorithm for jointly optimal control of session rate, link attempt rate, and link power in contention based MultiHop Wireless Networks. Formulating the ...
Abdorasoul Ghasemi, Karim Faez
CORR
2002
Springer
102views Education» more  CORR 2002»
13 years 9 months ago
Quantum Lower Bound for Recursive Fourier Sampling
One of the earliest quantum algorithms was discovered by Bernstein and Vazirani, for a problem called Recursive Fourier Sampling. This paper shows that the Bernstein-Vazirani algo...
Scott Aaronson
CORR
2002
Springer
113views Education» more  CORR 2002»
13 years 9 months ago
Robust Global Localization Using Clustered Particle Filtering
Global mobile robot localization is the problem of determining a robot's pose in an environment, using sensor data, when the starting position is unknown. A family of probabi...
Javier Nicolás Sánchez, Adam Milstei...
EOR
2000
43views more  EOR 2000»
13 years 9 months ago
A framework for the description of evolutionary algorithms
Evolutionary algorithms (EA) are optimisation techniques inspired from natural evolution processes. They handle a population of individuals that evolve with the help of informatio...
Alain Hertz, Daniel Kobler
CORR
2002
Springer
104views Education» more  CORR 2002»
13 years 9 months ago
Intelligent Search of Correlated Alarms for GSM Networks with Model-based Constraints
In order to control the process of data mining and focus on the things of interest to us, many kinds of constraints have been added into the algorithms of data mining. However, di...
Qingguo Zheng, Ke Xu, Weifeng Lv, Shilong Ma
CORR
2002
Springer
79views Education» more  CORR 2002»
13 years 9 months ago
Technical Note: Bias and the Quantification of Stability
Research on bias in machine learning algorithms has generally been concerned with the impact of bias on predictive accuracy. We believe that there are other factors that should al...
Peter D. Turney
CORR
2002
Springer
142views Education» more  CORR 2002»
13 years 9 months ago
Learning Algorithms for Keyphrase Extraction
Many academic journals ask their authors to provide a list of about five to fifteen keywords, to appear on the first page of each article. Since these key words are often phrases ...
Peter D. Turney
ENTCS
2000
60views more  ENTCS 2000»
13 years 9 months ago
Writing Constructive Proofs Yielding Efficient Extracted Programs
The NuPRL system [3] was designed for interactive writing of machine
Aleksey Nogin