Sciweavers

1765 search results - page 233 / 353
» Combinations of Weak Classifiers
Sort
View
JMLR
2006
107views more  JMLR 2006»
15 years 4 months ago
Consistency of Multiclass Empirical Risk Minimization Methods Based on Convex Loss
The consistency of classification algorithm plays a central role in statistical learning theory. A consistent algorithm guarantees us that taking more samples essentially suffices...
Di-Rong Chen, Tao Sun
PR
2006
155views more  PR 2006»
15 years 4 months ago
3D face detection using curvature analysis
Face detection is a crucial preliminary in many applications. Most all the approaches to face detection have focused on the use of two-dimensional images. We present an innovative...
Alessandro Colombo, Claudio Cusano, Raimondo Schet...
ADHOC
2005
134views more  ADHOC 2005»
15 years 4 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
AIM
2005
15 years 4 months ago
Description Logics and Planning
This paper surveys previous work on combining planning techniques with expressive representations of knowledge in description logics to reason about tasks, plans, and goals. Descr...
Yolanda Gil
TCS
2008
15 years 4 months ago
Real algebraic numbers and polynomial systems of small degree
We present exact and complete algorithms based on precomputed Sturm-Habicht sequences, discriminants and invariants, that classify, isolate with rational points and compare the re...
Ioannis Z. Emiris, Elias P. Tsigaridas