Sciweavers

3257 search results - page 251 / 652
» Some Results on Effective Randomness
Sort
View
ICPR
2008
IEEE
16 years 5 days ago
Cone-restricted subspace methods
In pattern recognition, feature vectors are occasionally subject to non-negative constraints. This characteristic can be expressed by a cone in feature vector space. In this paper...
Takumi Kobayashi, Nobuyuki Otsu
IEEEIAS
2008
IEEE
15 years 5 months ago
Matrix Factorization Approach for Feature Deduction and Design of Intrusion Detection Systems
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything...
Václav Snásel, Jan Platos, Pavel Kr&...
ISCAS
2006
IEEE
79views Hardware» more  ISCAS 2006»
15 years 5 months ago
Spike timing dependent adaptation for mismatch compensation
— This paper presents some circuitry for use within a visual-processing depth-recovery algorithm based upon spike timing. The accuracy of the depth calculation relies on a predic...
Katherine L. Cameron, Alan F. Murray, S. Collins
ACL
2008
15 years 13 days ago
The Role of Positive Feedback in Intelligent Tutoring Systems
The focus of this study is positive feedback in one-on-one tutoring, its computational modeling, and its application to the design of more effective Intelligent Tutoring Systems. ...
Davide Fossati
IPL
2006
84views more  IPL 2006»
14 years 11 months ago
Test suite oscillations
This paper proposes a set of new software test-diversity measures based on control oscillations of test suites. Oscillation Diversity uses conversion, inversion, and phase transfo...
Borislav Nikolik