Sciweavers

1541 search results - page 230 / 309
» Learning to Diagnose by Doing
Sort
View
ESSOS
2009
Springer
15 years 4 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely
SIBGRAPI
2009
IEEE
15 years 4 months ago
Hermite Interpolation of Implicit Surfaces with Radial Basis Functions
—We present the Hermite radial basis function (HRBF) implicits method to compute a global implicit function which interpolates scattered multivariate Hermite data (unstructured p...
Ives Macedo, Joao Paulo Gois, Luiz Velho
ACCV
2009
Springer
15 years 4 months ago
Similarity Scores Based on Background Samples
Evaluating the similarity of images and their descriptors by employing discriminative learners has proven itself to be an effective face recognition paradigm. In this paper we sho...
Lior Wolf, Tal Hassner, Yaniv Taigman
DILS
2009
Springer
15 years 4 months ago
Site-Wide Wrapper Induction for Life Science Deep Web Databases
We present a novel approach to automatic information extraction from Deep Web Life Science databases using wrapper induction. Traditional wrapper induction techniques focus on lear...
Saqib Mir, Steffen Staab, Isabel Rojas
PKDD
2009
Springer
134views Data Mining» more  PKDD 2009»
15 years 4 months ago
Multi-task Feature Selection Using the Multiple Inclusion Criterion (MIC)
Abstract. We address the problem of joint feature selection in multiple related classification or regression tasks. When doing feature selection with multiple tasks, usually one c...
Paramveer S. Dhillon, Brian Tomasik, Dean P. Foste...