Sciweavers

3873 search results - page 689 / 775
» Neighbourhood Components Analysis
Sort
View
IFIP
2010
Springer
14 years 12 months ago
Reasoning about Probabilistic Security Using Task-PIOAs
Abstract. Task-structured probabilistic input/output automata (taskPIOAs) are concurrent probabilistic automata that, among other things, have been used to provide a formal framewo...
Aaron D. Jaggard, Catherine Meadows, Michael Mislo...
INTERSPEECH
2010
14 years 12 months ago
Combining monaural and binaural evidence for reverberant speech segregation
Most existing binaural approaches to speech segregation rely on spatial filtering. In environments with minimal reverberation and when sources are well separated in space, spatial...
John Woodruff, Rohit Prabhavalkar, Eric Fosler-Lus...
JCIT
2010
190views more  JCIT 2010»
14 years 12 months ago
Application of Feature Extraction Method in Customer Churn Prediction Based on Random Forest and Transduction
With the development of telecom business, customer churn prediction becomes more and more important. An outstanding issue in customer churn prediction is high dimensional problem....
Yihui Qiu, Hong Li
JDCTA
2010
122views more  JDCTA 2010»
14 years 12 months ago
The Financial Structure and High-Tech Industries Development in China
The transformation of economic development approach demands to develop high-tech industries, while high-tech industries can't develop without financial support, in which diff...
Liuyong Yang, Shensheng Mo, Anqi Zhou
JIPS
2010
273views more  JIPS 2010»
14 years 12 months ago
Hiding Secret Data in an Image Using Codeword Imitation
This paper proposes a novel reversible data hiding scheme based on a Vector Quantization (VQ) codebook. The proposed scheme uses the principle component analysis (PCA) algorithm to...
Zhi-Hui Wang, Chin-Chen Chang, Pei-Yu Tsai