Sciweavers

3096 search results - page 43 / 620
» Theory and Use of the EM Algorithm
Sort
View
ICML
2004
IEEE
16 years 2 months ago
Margin based feature selection - theory and algorithms
Feature selection is the task of choosing a small set out of a given set of features that capture the relevant properties of the data. In the context of supervised classification ...
Ran Gilad-Bachrach, Amir Navot, Naftali Tishby
EC
1998
178views ECommerce» more  EC 1998»
15 years 1 months ago
The Simple Genetic Algorithm and the Walsh Transform: Part I, Theory
This paper is the first part of a two part series. It proves a number of direct relationships between the Fourier transform and the simple genetic algorithm. (For a binary repres...
Michael D. Vose, Alden H. Wright
ICRA
2008
IEEE
135views Robotics» more  ICRA 2008»
15 years 8 months ago
Path and trajectory diversity: Theory and algorithms
— We present heuristic algorithms for pruning large sets of candidate paths or trajectories down to smaller subsets that maintain desirable characteristics in terms of overall re...
Michael S. Branicky, Ross A. Knepper, James J. Kuf...
PAMI
2008
161views more  PAMI 2008»
15 years 1 months ago
TRUST-TECH-Based Expectation Maximization for Learning Finite Mixture Models
The Expectation Maximization (EM) algorithm is widely used for learning finite mixture models despite its greedy nature. Most popular model-based clustering techniques might yield...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
NIPS
1998
15 years 2 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp