Sciweavers

2424 search results - page 309 / 485
» A general algorithm for data dependence analysis
Sort
View
159
Voted
PAAPP
2007
398views more  PAAPP 2007»
15 years 3 months ago
Counting people using video cameras
The paper is devoted to the problem of estimating the number of people visible in a camera. It uses as features a portion of foreground pixels in each cell of a rectangular grid. ...
Damian Roqueiro, Valery A. Petrushin
144
Voted
ACL2
2006
ACM
15 years 9 months ago
Phylogenetic trees in ACL2
Biologists studying the evolutionary relationships between organisms use software packages to solve the computational problems they encounter. Several of these problems involve th...
Warren A. Hunt Jr., Serita M. Nelesen
GECCO
2008
Springer
174views Optimization» more  GECCO 2008»
15 years 4 months ago
Mask functions for the symbolic modeling of epistasis using genetic programming
The study of common, complex multifactorial diseases in genetic epidemiology is complicated by nonlinearity in the genotype-to-phenotype mapping relationship that is due, in part,...
Ryan J. Urbanowicz, Nate Barney, Bill C. White, Ja...
110
Voted
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
16 years 4 months ago
Mining tree queries in a graph
We present an algorithm for mining tree-shaped patterns in a large graph. Novel about our class of patterns is that they can contain constants, and can contain existential nodes w...
Bart Goethals, Eveline Hoekx, Jan Van den Bussche
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
16 years 4 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek