Ara
Toplam kayıt 6, listelenen: 1-6
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
Regularizing soft decision trees
(Springer, 2013)
Recently, we have proposed a new decision tree family called soft decision trees where a node chooses both its left and right children with different probabilities as given by a gating function, different from a hard ...
Microsoft Kinect Sensörü kullanarak zemin düzlemi algılama
(IEEE, 2013-06-13)
Görüntü işleme tabanlı mobil robotların başarılı navigasyonu için zemin düzlemi algılama esastır. Bu bildiride Kinect derinlik sensöründen elde edilen derinlik bilgisine dayalı yeni ve gürbüz bir zemin düzlemi algılama ...
A novel regression method for software defect prediction with kernel methods
(2013)
In this paper, we propose a novel method based on SVM to predict the number of defects in the files or classes of a software system. To model the relationship between source code similarity and defectiveness, we use SVM ...
Statistical tests using hinge/ε-sensitive loss
(Springer-Verlag, 2013)
Statistical tests used in the literature to compare algorithms use the misclassification error which is based on the 0/1 loss and square loss for regression. Kernel-based, support vector machine classifiers (regressors) ...
Efficient privacy-aware record integration
(2013)
The integration of information dispersed among multiple repositories is a crucial step for accurate data analysis in various domains. In support of this goal, it is critical to devise procedures for identifying similar ...