Sciweavers

5948 search results - page 986 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICML
2009
IEEE
16 years 4 months ago
Multi-assignment clustering for Boolean data
Conventional clustering methods typically assume that each data item belongs to a single cluster. This assumption does not hold in general. In order to overcome this limitation, w...
Andreas P. Streich, Mario Frank, David A. Basin, J...
ICML
2006
IEEE
16 years 4 months ago
Bayesian regression with input noise for high dimensional data
This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
SIGSOFT
2008
ACM
16 years 4 months ago
Experimenting with exception propagation mechanisms in service-oriented architecture
Exception handling is one of the popular means used for improving dependability and supporting recovery in the ServiceOriented Architecture (SOA). This practical experience paper ...
Anatoliy Gorbenko, Alexander Romanovsky, Vyachesla...
ISBI
2002
IEEE
16 years 4 months ago
Quantitative 3D CT bronchography
In the framework of computer-aided diagnosis, this paper proposes a novel functionality for computerized tomography (CT)based investigation of pulmonary airways. It provides a spe...
Catalin I. Fetita, Françoise J. Prête...
ISBI
2006
IEEE
16 years 4 months ago
Continuous image representations avoid the histogram binning problem in mutual information based image registration
Mutual information (MI) based image-registration methods that use histograms are known to suffer from the so-called binning problem, caused by the absence of a principled techniqu...
Ajit Rajwade, Arunava Banerjee, Anand Rangarajan