Sciweavers

5799 search results - page 908 / 1160
» Position Paper
Sort
View
CORR
2010
Springer
155views Education» more  CORR 2010»
15 years 4 months ago
Repairing People Trajectories Based on Point Clustering
This paper presents a method for improving any object tracking algorithm based on machine learning. During the training phase, important trajectory features are extracted which are...
Duc Phu Chau, François Brémond, Etie...
CORR
2008
Springer
70views Education» more  CORR 2008»
15 years 4 months ago
Every Computably Enumerable Random Real Is Provably Computably Enumerable Random
We prove that every computably enumerable (c.e.) random real is provable in Peano Arithmetic (PA) to be c.e. random. A major step in the proof is to show that the theorem stating ...
Cristian S. Calude, Nicholas J. Hay
DAM
2010
95views more  DAM 2010»
15 years 4 months ago
Excessive factorizations of bipartite multigraphs
Let G be a multigraph. We say that G is 1-extendable if every edge of G is contained in a 1-factor. Suppose G is 1-extendable. An excessive factorization of G is a set F = {F1, F2...
David Cariolaro, Romeo Rizzi
154
Voted
DATAMINE
2010
122views more  DATAMINE 2010»
15 years 4 months ago
Three naive Bayes approaches for discrimination-free classification
In this paper, we investigate how to modify the Naive Bayes classifier in order to perform classification that is restricted to be independent with respect to a given sensitive att...
Toon Calders, Sicco Verwer
146
Voted
CSDA
2008
147views more  CSDA 2008»
15 years 4 months ago
Detection of unknown computer worms based on behavioral classification of the host
Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
Robert Moskovitch, Yuval Elovici, Lior Rokach