6 Hits in 7.0 sec

OCKELM+: Kernel Extreme Learning Machine based One-class Classification using Privileged Information (or KOC+: Kernel Ridge Regression or Least Square SVM with zero bias based One-class Classification using Privileged Information) [article]

Chandan Gautam, Aruna Tiwari, M. Tanveer
2019 arXiv   pre-print
In this letter, kernel ridge regression (KRR) based one-class classifier (KOC) has been extended for learning using privileged information (LUPI). LUPI-based KOC method is referred to as KOC+.  ...  Kernel method-based one-class classifier is mainly used for outlier or novelty detection.  ...  One-class classification using kernel learning is a well-known approach for outlier or novelty detection.  ... 
arXiv:1904.08338v1 fatcat:josk6dvr5vhaneqk32vnlwcieq

On Fitting Finite Dirichlet Mixture Using ECM and MML [chapter]

Nizar Bouguila, Djemel Ziou
2005 Lecture Notes in Computer Science  
We study a fluid system with single on/off source in which the active (on) and silent periods (off) follow General and Exponential distributions respectively.  ...  Semiparametric regression with kernel error model We propose and study a class of regression models, in which the mean function is specified parametrically as in the existing regression methods, but the  ...  model y = Xβ + f + We introduced a combined Ridge-Stein (CRS) estimation of a semiparametric regression model.  ... 
doi:10.1007/11551188_19 fatcat:gtzi5u6emvfyxea3zbklobnvom

Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet

Min-Shiang Hwang, Shu-Fen Chiou, Chia-Chun Wu, Cheng-Yi Yang, Ajith Abraham, Korea, Wael Adi, Iqbal Sheikh, Ahamed, Vijay Atluri, Mauro Barni, Andrew Blyth (+36 others)
2016 unpublished
SVMs were originally designed for binary-class classification; hence, it is straightforward to use this paradigm in the present problem for classification between normal and malicious behavior in the patterns  ...  Use of a kernel function [18] addressed the curse of dimensionality and the solution implicitly contains support vectors that provide a description of the significant data for classification.  ...  Since then many cryptographic schemes have been proposed based on CL-PKC.  ... 

PATTERNS Publicity Chairs PATTERNS Publicity Chairs PATTERNS 2015 Technical Program Committee

Fritz Laux, Fritz Laux, Michal Zemlicka, Alfred Zimmermann, Richard Laing, Ricardo Sanz, Upm Aslab, Mauricio Spain, Hess-Flores, Nguyen Hoàng, France Mirnig, Bastian Roth (+102 others)
It is believed that patterns play an important role on cognition, automation, and service computation and orchestration areas. Antipatterns come as a normal output as needed lessons learned.  ...  ACKNOWLEDGMENT The authors would like to thank Golnaz Badkoubeh for her insightful comments on the formalisation method, to thank Ehsun Behravesh, Aristide Fattori, Danut Niculae, and Michal Sroka for  ...  However, the most common and widely used classification method is based on Henry's classification [8] Figure 1 ). Figure 1.  ... 

"The Enormous Failure of Nature" Famine and Society in the Nineteenth Century Board of Consulting Editors

Thomas Devaney, Josephine Hoegaerts, Nora Hämäläinen, Simo Knuuttila, Klaus Laalo, Merja Polvinen, Mari Wiklund, Laura Assmuth, Marghareta Carucci, Denis Casey, Douglas Davies, Charles Husband (+18 others)
As a result, the railway authorities reserved land on a nearby ridge for the purpose.  ...  The narrator uses the concepts of "upper class" and "working class".  ...  Introduction, Structure & Sources This interim report is based on a combination of fieldwork, and primary / secondary source research, and is a step towards the creation of a comprehensive record of memorials  ... 

Dagstuhl Reports, Volume 11, Issue 7, August 2021, Complete Issue [article]

Current methods are mainly focusing on one specific higher-order aspect, but different aspects may interact.  ...  This call for more research on the combination of different higher-order model facets.  ...  However, his classification leaves much to be desired: it identifies only seven types of MWE; the top-level division is based on lexicalization -a gradient feature; the second privileges support verb constructions  ... 
doi:10.4230/dagrep.11.7 fatcat:4b73kynisffo7payzzghe5rfiq