Sciweavers

1862 search results - page 175 / 373
» Constrained pattern matching
Sort
View
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
15 years 9 months ago
Cross-Mining Binary and Numerical Attributes
We consider the problem of relating itemsets mined on binary attributes of a data set to numerical attributes of the same data. An example is biogeographical data, where the numer...
Gemma C. Garriga, Hannes Heikinheimo, Jouni K. Sep...
NIPS
2000
15 years 4 months ago
Vicinal Risk Minimization
The Vicinal Risk Minimization principle establishes a bridge between generative models and methods derived from the Structural Risk Minimization Principle such as Support Vector M...
Olivier Chapelle, Jason Weston, Léon Bottou...
VTC
2008
IEEE
131views Communications» more  VTC 2008»
15 years 9 months ago
Downtilted Base Station Antennas - A Simulation Model Proposal and Impact on HSPA and LTE Performance
— This paper proposes a low-complexity model for vertical antenna radiation patterns, e.g. for inclusion in systemlevel simulations. They can be seen as extensions to the horizon...
Fredrik Gunnarsson, Martin N. Johansson, Anders Fu...
EUSFLAT
2009
125views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
A Dynamic Classification Method for the Discrimination of Evolving Data
Classes issued of evolving systems are dynamic and their characteristics vary over the time. Assigning a pattern to a class is achieved using a classifier. Therefore, the classifie...
Laurent Hartert, Moamar Sayed Mouchaweh, Patrice B...
UIST
1998
ACM
15 years 7 months ago
A User Interface Using Fingerprint Recognition: Holding Commands and Data Objects on Fingers
This paper describes a new user interface, called a fingerprint user interface (FUI), which employs fingerprint recognition. While the unique feature patterns of fingerprints have...
Atsushi Sugiura, Yoshiyuki Koseki