Sciweavers

4616 search results - page 839 / 924
» Extreme Components Analysis
Sort
View
IFIP
2010
Springer
14 years 10 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
JCIT
2010
190views more  JCIT 2010»
14 years 10 months ago
Application of Feature Extraction Method in Customer Churn Prediction Based on Random Forest and Transduction
With the development of telecom business, customer churn prediction becomes more and more important. An outstanding issue in customer churn prediction is high dimensional problem....
Yihui Qiu, Hong Li
JDCTA
2010
122views more  JDCTA 2010»
14 years 10 months ago
The Financial Structure and High-Tech Industries Development in China
The transformation of economic development approach demands to develop high-tech industries, while high-tech industries can't develop without financial support, in which diff...
Liuyong Yang, Shensheng Mo, Anqi Zhou
117
Voted
JIPS
2010
273views more  JIPS 2010»
14 years 10 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai
JMLR
2010
194views more  JMLR 2010»
14 years 10 months ago
Graphical Gaussian modelling of multivariate time series with latent variables
In time series analysis, inference about causeeffect relationships among multiple times series is commonly based on the concept of Granger causality, which exploits temporal struc...
Michael Eichler