Sciweavers

4208 search results - page 486 / 842
» Challenges in Evaluating Distributed Algorithms
Sort
View
135
Voted
CLEF
2010
Springer
15 years 4 months ago
DAEDALUS at WebPS-3 2010: k-Medoids Clustering Using a Cost Function Minimization
This paper describes the participation of DAEDALUS team at the WebPS-3 Task 1, regarding Web People Search. The focus of our research is to evaluate and compare the computational r...
Sara Lana-Serrano, Julio Villena-Román, Jos...
140
Voted

Publication
241views
15 years 4 months ago
Fast and Automatic Object Pose Estimation for Range Images on the GPU
We present a pose estimation method for rigid objects from single range images. Using 3D models of the objects, many pose hypotheses are compared in a data-parallel version of t...
In Kyu Park, Marcel Germann, Michael D. Breitenste...
135
Voted
ICML
2010
IEEE
15 years 3 months ago
Application of Machine Learning To Epileptic Seizure Detection
We present and evaluate a machine learning approach to constructing patient-specific classifiers that detect the onset of an epileptic seizure through analysis of the scalp EEG, a...
Ali H. Shoeb, John V. Guttag
137
Voted
CORR
2010
Springer
139views Education» more  CORR 2010»
15 years 3 months ago
Fast Overlapping Group Lasso
The group Lasso is an extension of the Lasso for feature selection on (predefined) non-overlapping groups of features. The non-overlapping group structure limits its applicability...
Jun Liu, Jieping Ye
127
Voted
ISI
2007
Springer
15 years 3 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...