Sciweavers

2652 search results - page 480 / 531
» When Information Improves Information Security
Sort
View
ECCV
2010
Springer
15 years 29 days ago
Location Recognition Using Prioritized Feature Matching
We present a fast, simple location recognition and image localization method that leverages feature correspondence and geometry estimated from large Internet photo collections. Suc...
Yunpeng Li, Noah Snavely, Daniel P. Huttenlocher
GECCO
2010
Springer
186views Optimization» more  GECCO 2010»
15 years 29 days ago
Genetic rule extraction optimizing brier score
Most highly accurate predictive modeling techniques produce opaque models. When comprehensible models are required, rule extraction is sometimes used to generate a transparent mod...
Ulf Johansson, Rikard König, Lars Niklasson
AI
2008
Springer
14 years 12 months ago
Strategic bidding in continuous double auctions
In this paper, we describe a novel bidding strategy that autonomous trading agents can use to participate in Continuous Double Auctions (CDAs). Our strategy is based on both short...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
BMCBI
2007
111views more  BMCBI 2007»
14 years 12 months ago
Novel definition files for human GeneChips based on GeneAnnot
Background: Improvements in genome sequence annotation revealed discrepancies in the original probeset/gene assignment in Affymetrix microarray and the existence of differences be...
Francesco Ferrari, Stefania Bortoluzzi, Alessandro...
BMCBI
2010
91views more  BMCBI 2010»
14 years 12 months ago
Ranked retrieval of Computational Biology models
Background: The study of biological systems demands computational support. If targeting a biological problem, the reuse of existing computational models can save time and effort. ...
Ron Henkel, Lukas Endler, Andre Peters, Nicolas Le...