Sciweavers

12257 search results - page 2189 / 2452
» Analysis of Algorithms
Sort
View
NIPS
1996
15 years 5 months ago
Combinations of Weak Classifiers
To obtain classification systems with both good generalizat`ion performance and efficiency in space and time, we propose a learning method based on combinations of weak classifiers...
Chuanyi Ji, Sheng Ma
TREC
2007
15 years 5 months ago
Passage Relevancy Through Semantic Relatedness
Questions that require answers in the form of a list of entities and the identification of diverse biological entity classes present an interesting challenge that required new app...
Luis Tari, Phan Huy Tu, Barry Lumpkin, Robert Leam...
WEWORC
2007
162views Cryptology» more  WEWORC 2007»
15 years 5 months ago
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
The stream ciphers Py, Pypy and Py6 were designed by Biham and Seberry for the ECRYPT-eSTREAM project in 2005. The ciphers were promoted to the ‘Focus’ ciphers of the Phase II ...
Gautham Sekar, Souradyuti Paul, Bart Preneel
APVIS
2009
15 years 5 months ago
Correlation study of time-varying multivariate climate data sets
We present a correlation study of time-varying multivariate volumetric data sets. In most scientific disciplines, to test hypotheses and discover insights, scientists are interest...
Jeffrey Sukharev, Chaoli Wang, Kwan-Liu Ma, Andrew...
BIOCOMP
2008
15 years 5 months ago
Improved Segmentation Based on Probabilistic Labeling
⎯This paper presents an improved multi-object segmentation algorithm based on probabilistic labeling. First, a critical look is focused on utilizing vector calculus operator and ...
Kai-Chieh Yang, Ming-Chi Jhuang, Chun-Shun Tseng, ...
« Prev « First page 2189 / 2452 Last » Next »