Sciweavers

89 search results - page 14 / 18
» Using Validation Sets to Avoid Overfitting in AdaBoost
Sort
View
CVPR
2005
IEEE
15 years 11 months ago
Random Subspaces and Subsampling for 2-D Face Recognition
Random subspaces are a popular ensemble construction technique that improves the accuracy of weak classifiers. It has been shown, in different domains, that random subspaces combi...
Nitesh V. Chawla, Kevin W. Bowyer
ICRA
2006
IEEE
180views Robotics» more  ICRA 2006»
15 years 3 months ago
Active Control for Single Camera SLAM
— In this paper we consider a single hand-held camera performing SLAM at video rate with generic 6DOF motion. The aim is to optimise both the localisation of the sensor and build...
Teresa Vidal-Calleja, Andrew J. Davison, Juan Andr...
INFOCOM
2006
IEEE
15 years 3 months ago
Comparison Studies between Pre-Shared and Public Key Exchange Mechanisms for Transport Layer Security
Abstract— The pre-shared key based mechanisms for Transport Layer Security (TLS) were recently standardized by the IETF to extend the set of ciphersuites by utilizing existing ke...
Fang-Chun Kuo, Hannes Tschofenig, Fabian Meyer, Xi...
KR
1998
Springer
15 years 1 months ago
AOL: A logic of Acting, Sensing, Knowing, and Only Knowing
This work is motivated by the existence of two useful but quite different knowledge representation formalisms, the situation calculus due to McCarthy, and the logic OL of only kno...
Gerhard Lakemeyer, Hector J. Levesque
RTS
2006
84views more  RTS 2006»
14 years 9 months ago
Finite-horizon scheduling of radar dwells with online template construction
Timing constraints for radar tasks are usually specified in terms of the minimum and maximum temporal distance between successive radar dwells. We utilize the idea of feasible int...
Sathish Gopalakrishnan, Marco Caccamo, Chi-Sheng S...