Sciweavers

2111 search results - page 331 / 423
» An Approach to Software Testing of Machine Learning Applicat...
Sort
View
ICRA
2009
IEEE
130views Robotics» more  ICRA 2009»
15 years 10 months ago
Model adaptation with least-squares SVM for adaptive hand prosthetics
— The state-of-the-art in control of hand prosthetics is far from optimal. The main control interface is represented by surface electromyography (EMG): the activation potentials ...
Francesco Orabona, Claudio Castellini, Barbara Cap...
INFOCOM
2009
IEEE
15 years 10 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
PRIB
2009
Springer
147views Bioinformatics» more  PRIB 2009»
15 years 10 months ago
Cross-Platform Analysis with Binarized Gene Expression Data
Abstract. With widespread use of microarray technology as a potential diagnostics tool, the comparison of results obtained from the use of different platforms is of interest. When...
Salih Tuna, Mahesan Niranjan
ACIVS
2006
Springer
15 years 9 months ago
Discrete Choice Models for Static Facial Expression Recognition
In this paper we propose the use of Discrete Choice Analysis (DCA) for static facial expression classification. Facial expressions are described with expression descriptive units ...
Gianluca Antonini, Matteo Sorci, Michel Bierlaire,...
HAIS
2010
Springer
15 years 8 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...