Sciweavers

1765 search results - page 127 / 353
» Combinations of Weak Classifiers
Sort
View
108
Voted
INAP
2001
Springer
15 years 8 months ago
Content-based Management of Document Access Control
Three different security models have been advocated to determine the access rights to documents in a network of computers; DAC, MLS, and RBAC. Each of these models has its strengt...
Edgar Weippl, Ismail Khalil Ibrahim, Werner Winiwa...
151
Voted
PRIS
2008
15 years 5 months ago
Comparison of Adaboost and ADTboost for Feature Subset Selection
Abstract. This paper addresses the problem of feature selection within classification processes. We present a comparison of a feature subset selection with respect to two boosting ...
Martin Drauschke, Wolfgang Förstner
141
Voted
NIPS
2004
15 years 5 months ago
An Application of Boosting to Graph Classification
This paper presents an application of Boosting for classifying labeled graphs, general structures for modeling a number of real-world data, such as chemical compounds, natural lan...
Taku Kudo, Eisaku Maeda, Yuji Matsumoto
135
Voted
IJNSEC
2008
110views more  IJNSEC 2008»
15 years 3 months ago
Improvement on Nominative Proxy Signature Schemes
In a nominative proxy signature scheme, an original singer delegates his signing power to a proxy signer, who generates a nominative signature on behalf of the original signer. In...
Zuo-Wen Tan
88
Voted
JNS
2008
44views more  JNS 2008»
15 years 3 months ago
The Scaling Attractor and Ultimate Dynamics for Smoluchowski's Coagulation Equations
We describe a basic framework for studying dynamic scaling that has roots in dynamical systems and probability theory. Within this framework, we study Smoluchowski's coagulat...
Govind Menon, Robert L. Pego