Sciweavers

2421 search results - page 163 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
128
Voted
PERCOM
2005
ACM
16 years 3 months ago
Reducing the Calibration Effort for Location Estimation Using Unlabeled Samples
WLAN location estimation based on 802.11 signal strength is becoming increasingly prevalent in today's pervasive computing applications. As alternative to the wellestablished...
Xiaoyong Chai, Qiang Yang
ICONS
2008
IEEE
15 years 10 months ago
Using User Preferences to Enhance Privacy in Pervasive Systems
With the increasing interest in developing pervasive computing technologies there is growing recognition of the problems of maintaining user privacy. In the Daidalos pervasive sys...
Elizabeth Papadopoulou, Sarah McBurney, Nick K. Ta...
138
Voted
IJCAI
2003
15 years 4 months ago
Constructing Diverse Classifier Ensembles using Artificial Training Examples
Ensemble methods like bagging and boosting that combine the decisions of multiple hypotheses are some of the strongest existing machine learning methods. The diversity of the memb...
Prem Melville, Raymond J. Mooney
127
Voted
FASE
2010
Springer
15 years 10 months ago
Proving Consistency and Completeness of Model Classes Using Theory Interpretation
Abstract. Abstraction is essential in the formal specification of programs. A common way of writing abstract specifications is to specify implementations in terms of basic mathem...
Ádám Darvas, Peter Müller
133
Voted
PAA
2000
15 years 3 months ago
Using Renyi's Information and Wavelets for Target Detection: An Application to Mammograms
Abstract: In this paper we present a multi-scale method for the detection of small targets embedded in noisy background. The multiscale representation is built using a weighted und...
Giuseppe Boccignone, Angelo Chianese, Antonio Pica...