Sciweavers

871 search results - page 76 / 175
» Selection of Classifiers Based on Multiple Classifier Behavi...
Sort
View
EMNLP
2009
15 years 1 months ago
Reverse Engineering of Tree Kernel Feature Spaces
We present a framework to extract the most important features (tree fragments) from a Tree Kernel (TK) space according to their importance in the target kernelbased machine, e.g. ...
Daniele Pighin, Alessandro Moschitti
176
Voted
PR
2011
14 years 6 months ago
Hierarchical annotation of medical images
In this paper, we describe an approach for the automatic medical annotation task of the 2008 CLEF cross-language image retrieval campaign (ImageCLEF). The data comprise 12076 full...
Ivica Dimitrovski, Dragi Kocev, Suzana Loskovska, ...
APNOMS
2006
Springer
15 years 7 months ago
Rate-Based and Gap-Based Available Bandwidth Estimation Techniques in Cross-Traffic Context
Recent years have seen an increasing interest in end-to-end available bandwidth estimation. A number of estimation techniques and tools have been developed during the last few year...
Wayman Tan, Marat Zhanikeev, Yoshiaki Tanaka
CCIA
2009
Springer
15 years 4 months ago
On in-vitro and in-vivo IVUS data fusion
Abstract. The design and the validation of an automatic plaque characterization technique based on Intravascular Ultrasound (IVUS) usually requires a data ground-truth. The histolo...
Francesco Ciompi, Oriol Pujol, Oriol Rodriguez-Leo...
136
Voted
ASIAN
2004
Springer
117views Algorithms» more  ASIAN 2004»
15 years 8 months ago
The Feature Selection and Intrusion Detection Problems
Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents o...
Andrew H. Sung, Srinivas Mukkamala