Sciweavers

4131 search results - page 326 / 827
» The Generalized Max-Controlled Set Problem
Sort
View
ICML
2010
IEEE
15 years 5 months ago
Risk minimization, probability elicitation, and cost-sensitive SVMs
A new procedure for learning cost-sensitive SVM classifiers is proposed. The SVM hinge loss is extended to the cost sensitive setting, and the cost-sensitive SVM is derived as the...
Hamed Masnadi-Shirazi, Nuno Vasconcelos
ESWA
2006
110views more  ESWA 2006»
15 years 4 months ago
XKey: A tool for the generation of identification keys
This paper presents the development of XKey, a tool for generating taxonomical identification keys by means of decision tree construction. The tool is based on an XML standard for...
Miguel Delgado Calvo-Flores, Waldo Fajardo Contrer...
JUCS
2006
97views more  JUCS 2006»
15 years 4 months ago
Plagiarism - A Survey
: Plagiarism in the sense of "theft of intellectual property" has been around for as long as humans have produced work of art and research. However, easy access to the We...
Hermann A. Maurer, Frank Kappe, Bilal Zaka
KES
2006
Springer
15 years 4 months ago
A Framework for distributed knowledge management in autonomous logistic processes
The trends and recent changes in logistics lead to complex and partially conflicting requirements on logistic planning and control systems. Due to the lack of efficiency of curren...
Hagen Langer, Jan D. Gehrke, Joachim Hammer, Marti...
120
Voted
AI
2005
Springer
15 years 4 months ago
First order LUB approximations: characterization and algorithms
One of the major approaches to approximation of logical theories is the upper and lower bounds approach introduced in (Selman and Kautz, 1991, 1996). In this paper, we address the...
Alvaro del Val