Sciweavers

1717 search results - page 319 / 344
» Error concealment using a diffusion based method
Sort
View
AVBPA
2005
Springer
426views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Calculation of a Composite DET Curve
Abstract. The verification performance of biometric systems is normally evaluated using the receiver operating characteristic (ROC) or detection error trade-off (DET) curve. We p...
Andy Adler, Michael E. Schuckers
KDD
1998
ACM
120views Data Mining» more  KDD 1998»
15 years 2 months ago
Large Datasets Lead to Overly Complex Models: An Explanation and a Solution
This paper explores unexpected results that lie at the intersection of two common themes in the KDD community: large datasets and the goal of building compact models. Experiments ...
Tim Oates, David Jensen
MCS
2000
Springer
15 years 1 months ago
Combining Fisher Linear Discriminants for Dissimilarity Representations
Abstract Investigating a data set of the critical size makes a classification task difficult. Studying dissimilarity data refers to such a problem, since the number of samples equa...
Elzbieta Pekalska, Marina Skurichina, Robert P. W....
SIGCOMM
1995
ACM
15 years 1 months ago
Performance Bounds in Communication Networks with Variable-Rate Links
In most network models for quality of service support, the communication links interconnecting the switches and gateways are assumed to have fixed bandwidth and zero error rate. T...
Kam Lee
CIMCA
2005
IEEE
14 years 11 months ago
Fuzzy System Modeling with the Genetic and Differential Evolutionary Optimization
This paper compares the performance of two provably successful evolutionary optimization tools in the optimization of a Fuzzy-Rule-Base (FRB) for the three well known fuzzy modeli...
Mehmet Bodur, Adnan Acan, Talip Akyol