Random

Results: 10533



#Item
901Machine learning / Artificial neural networks / Perceptron / Conditional random field / Supervised learning / Pattern recognition / Generalization error / Structured prediction / Kernel perceptron

On Herding and the Perceptron Cycling Theorem Andrew E. Gelfand, Yutian Chen, Max Welling Department of Computer Science University of California, Irvine {agelfand,yutianc,welling}@ics.uci.edu

Add to Reading List

Source URL: lvdmaaten.github.io

Language: English - Date: 2016-07-16 15:30:43
902Natural language processing / Machine learning / Markov models / Computational linguistics / Data mining / Information extraction / Part-of-speech tagging / Search engine indexing / Conditional random field / Speech recognition / Sentence / Bag-of-words model

Extracting Route Directions from Web Pages Xiao Zhang! , Prasenjit Mitra!† , Sen Xu‡ , Anuj R. Jaiswal† , Alex Klippel‡ , Alan MacEachren‡ ! Department of Computer Science and Engineering

Add to Reading List

Source URL: webdb09.cse.buffalo.edu

Language: English - Date: 2009-06-24 13:24:22
903Water pollution / Environmental engineering / Sanitation / Escherichia coli / Sewerage / RAPD / Combined sewer / Coliform index / Sewage / E. coli

A Preliminary Study of the Sources of E. coli Contamination at Marquette Park Beach by Random Amplified Polymorphic DNA Typing

Add to Reading List

Source URL: www.great-lakes.net

Language: English - Date: 2003-11-04 10:43:44
904Operations research / Mathematical optimization / Stochastic processes / Convex optimization / Expected value / Normal distribution / Probability density function / Stochastic programming / Convergence of random variables

Typical Properties of Winners and Losers in Discrete Optimization Rene Beier∗ Max-Planck-Institut f¨ur Informatik Saarbr¨ucken

Add to Reading List

Source URL: www-i1.informatik.rwth-aachen.de

Language: English - Date: 2007-01-05 13:31:59
905Cryptography / Cryptographic hash functions / Preimage attack / Advantage / Permutation / Random oracle / Birthday attack

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2008-07-20 11:55:06
906Symbol / Table of stars with Bayer designations

arXiv:math/0701279v1 [math.SP] 10 JanSTABILITY OF SPECTRAL TYPES FOR JACOBI MATRICES UNDER DECAYING RANDOM PERTURBATIONS JONATHAN BREUER1,2 AND YORAM LAST1,3

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2013-07-30 15:54:48
907Software testing / Concolic testing / Symbolic execution / Java Pathfinder / KeY / Random testing / Model checking / Satisfiability modulo theories / Unit testing / Type system / White-box testing / Fuzz testing

Symbolic Execution for Software Testing in Practice – Preliminary Assessment Patrice Godefroid Imperial College London

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-08 07:04:45
908Ensemble learning / Computational statistics / Machine learning / Bootstrap aggregating / Boosting / Statistical classification / Bootstrapping / Ensembles of classifiers / Random subspace method

Machine Learning: Ensemble Methods 1 Learning Ensembles

Add to Reading List

Source URL: twiki.di.uniroma1.it

Language: English - Date: 2016-04-22 07:17:45
909Giving / Virtue / Lesson plan / Pedagogy / Teaching / Random act of kindness / Kindness / Life Vest Inside / Emergent curriculum

A project of ConnectSafely.org Classroom Lesson – Kindergarten to Grade 2

Add to Reading List

Source URL: onegoodthing.org

Language: English - Date: 2016-01-04 16:54:46
910Vision / 3D imaging / Stereoscopy / Cerebrum / Visual perception / Binocular disparity / Stereopsis / Random dot stereogram / Simple cell / Visual cortex / Binocular neurons

Disparity Energy Model Using a Trained Neuronal Population Jaime A. Martins J.M.F. Rodrigues

Add to Reading List

Source URL: w3.ualg.pt

Language: English - Date: 2012-01-24 17:20:39
UPDATE