The wavelet transform has been used for feature extraction in many applications of pattern recognition. However, in general the learning algorithms are not designed taking into acc...
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Discriminative learning techniques for sequential data have proven to be more effective than generative models for named entity recognition, information extraction, and other task...
Acetylcholine (ACh) has been implicated in a wide variety of tasks involving attentional processes and plasticity. Following extensive animal studies, it has previously been sugge...
In this paper, we consider the relationship between risksensitivity and information. Product estimators are introduced as a generalization of Maximum A Posteriori Probability (MAP...
Vahid Reza Ramezani, Steven I. Marcus, Michael C. ...