Sciweavers

3556 search results - page 689 / 712
» Can machine learning be secure
Sort
View
ARTMED
2002
76views more  ARTMED 2002»
15 years 19 days ago
Logistic-based patient grouping for multi-disciplinary treatment
Present-day healthcare witnesses a growing demand for coordination of patient care. Coordination is needed especially in those cases in which hospitals have structured healthcare ...
Laura Maruster, Ton Weijters, Geerhard de Vries, A...
COLING
2002
15 years 17 days ago
The LinGO Redwoods Treebank: Motivation and Preliminary Applications
The LinGO Redwoods initiative is a seed activity in the design and development of a new type of treebank. While several medium- to large-scale treebanks exist for English (and for...
Stephan Oepen, Kristina Toutanova, Stuart M. Shieb...
107
Voted
PRL
2010
159views more  PRL 2010»
14 years 11 months ago
Creating diverse nearest-neighbour ensembles using simultaneous metaheuristic feature selection
The nearest-neighbour (1NN) classifier has long been used in pattern recognition, exploratory data analysis, and data mining problems. A vital consideration in obtaining good res...
Muhammad Atif Tahir, Jim E. Smith
95
Voted
VR
2010
IEEE
174views Virtual Reality» more  VR 2010»
14 years 11 months ago
Breaking the status quo: Improving 3D gesture recognition with spatially convenient input devices
We present a systematic study on the recognition of 3D gestures using spatially convenient input devices. Specifically, we examine the linear acceleration-sensing Nintendo Wii Re...
Michael Hoffman, Paul Varcholik, Joseph J. LaViola...
128
Voted
WCRE
2010
IEEE
14 years 11 months ago
Software Process Recovery: Recovering Process from Artifacts
—Often stakeholders, such as developers, managers, or buyers, want to find out what software development processes are being followed within a software project. Their reasons in...
Abram Hindle