Sciweavers

247 search results - page 34 / 50
» Infrastructure Risk Reduction
Sort
View
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
14 years 11 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
PR
2006
229views more  PR 2006»
14 years 9 months ago
FS_SFS: A novel feature selection method for support vector machines
In many pattern recognition applications, high-dimensional feature vectors impose a high computational cost as well as the risk of "overfitting". Feature Selection addre...
Yi Liu, Yuan F. Zheng
TCSV
2008
110views more  TCSV 2008»
14 years 9 months ago
Fuzzy-Logic Congestion Control of Transcoded Video Streaming Without Packet Loss Feedback
Congestion control of a variable bit-rate video stream crossing the Internet is crucial to ensuring the quality of the received video. When a fuzzy-logic congestion controller (FL...
Emmanuel Jammeh, Martin Fleury, Mohammed Ghanbari
ESORICS
2010
Springer
14 years 7 months ago
Speaker Recognition in Encrypted Voice Streams
Transmitting voice communication over untrusted networks puts personal information at risk. Although voice streams are typically encrypted to prevent unwanted eavesdropping, additi...
Michael Backes, Goran Doychev, Markus Dürmuth...
104
Voted
ICIP
2010
IEEE
14 years 7 months ago
3D vertebrae segmentation using graph cuts with shape prior constraints
Osteoporosis is a bone disease characterized by a reduction in bone mass, resulting in an increased risk of fractures. To diagnose the osteoporosis accurately, bone mineral densit...
Melih S. Aslan, Asem M. Ali, Dongqing Chen, Ben Ar...