Sciweavers

9886 search results - page 1866 / 1978
» Learning Compressible Models
Sort
View
133
Voted
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 3 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh
157
Voted
CONSTRAINTS
2008
182views more  CONSTRAINTS 2008»
15 years 3 months ago
Constraint Programming in Structural Bioinformatics
Bioinformatics aims at applying computer science methods to the wealth of data collected in a variety of experiments in life sciences (e.g. cell and molecular biology, biochemistry...
Pedro Barahona, Ludwig Krippahl
CORR
2010
Springer
167views Education» more  CORR 2010»
15 years 3 months ago
Network Flow Algorithms for Structured Sparsity
We consider a class of learning problems that involve a structured sparsityinducing norm defined as the sum of -norms over groups of variables. Whereas a lot of effort has been pu...
Julien Mairal, Rodolphe Jenatton, Guillaume Obozin...
109
Voted
CORR
2010
Springer
140views Education» more  CORR 2010»
15 years 3 months ago
Image Segmentation by Discounted Cumulative Ranking on Maximal Cliques
We propose a mid-level image segmentation framework that combines multiple figure-ground hypothesis (FG) constrained at different locations and scales, into interpretations that t...
João Carreira, Adrian Ion, Cristian Sminchi...
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 3 months ago
Information Acquisition and Exploitation in Multichannel Wireless Networks
A wireless system with multiple channels is considered, where each channel has several transmission states. A user learns about the instantaneous state of an available channel by ...
Sudipto Guha, Kamesh Munagala, Saswati Sarkar
« Prev « First page 1866 / 1978 Last » Next »