Sciweavers

1050 search results - page 50 / 210
» Two methods of authenticated positioning
Sort
View
ICNC
2005
Springer
15 years 5 months ago
An Improved Method of Feature Selection Based on Concept Attributes in Text Classification
The feature selection and weighting are two important parts of automatic text classification. In this paper we give a new method based on concept attributes. We use the DEF Terms o...
Shasha Liao, Minghu Jiang
111
Voted
ICARCV
2002
IEEE
166views Robotics» more  ICARCV 2002»
15 years 4 months ago
Similarity measure determination from NURBS-warping method
With the advances in digital imagery, large accessible data storage, internet repositories, and image applications, information conveyed through images is gaining in importance. T...
Kim Meng Liang, Mandava Rajeswari, Bee Ee Khoo
TJS
2010
182views more  TJS 2010»
14 years 10 months ago
A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning
This paper presents a novel host-based combinatorial method based on k-Means clustering and ID3 decision tree learning algorithms for unsupervised classification of anomalous and ...
Yasser Yasami, Saadat Pour Mozaffari
ECCV
2010
Springer
15 years 5 months ago
A Fast Dual Method for HIK SVM Learning
Histograms are used in almost every aspect of computer vi-4 4 sion, from visual descriptors to image representations. Histogram Inter-5 5 section Kernel (HIK) and SVM classifiers ...
ICS
1993
Tsinghua U.
15 years 3 months ago
Graph Contraction for Physical Optimization Methods: A Quality-Cost Tradeoff for Mapping Data on Parallel Computers
Mapping data to parallel computers aims at minimizing the execution time of the associated application. However, it can take an unacceptable amount of time in comparison with the ...
Nashat Mansour, Ravi Ponnusamy, Alok N. Choudhary,...