Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Most research in text classification to date has used a “bag of words” representation in which each feature corresponds to a single word. This paper examines some alternative ways to represent text based on syntactic and semantic... more
    • by 
    •   17  
      Natural Language ProcessingRepresentationsLearningText Classification
Voting in uncontrolled environment either by post or by the Internet is about to be made generally available in many countries. The main purpose is to increase participation at times when the voter turnout is generally decreasing.... more
    • by 
    •   5  
      BusinessComputer ScienceElectronic VotingSide Effect
    • by 
    •   17  
      Expert SystemsStatisticsData MiningRadial Basis Function
Of late, Network Security Research is taking center stage given the vulnerability of computing ecosystem with networking systems increasingly falling to hackers. On the network security canvas, Intrusion detection system (IDS) is an... more
    • by  and +1
    •   6  
      Particle Swarm OptimizationEnsembleMulti-layer PerceptronIntrusion Detection System
    • by 
    •   20  
      PediatricsAdolescentHumansChild
    • by 
    •   6  
      CrowdsourcingMultimedia information retrievalImage AnnotationKolmogorov-Smirnov test
Never has voting been more important in corporate law. With greater activism among shareholders and the shift from plurality to majority voting for directors, the number of close votes is rising. But is the basic technology of corporate... more
    • by 
    •   4  
      LegitimacyOwnership StructureTrade VolumeMajority voting
    • by 
    •   3  
      Pattern RecognitionImage ClassificationMajority voting
Most research in text classification has used the “bag of words ” representation of text. This paper examines some alternative ways to represent text based on syntactic and semantic relationships between words (phrases, synonyms and... more
    • by 
    •   17  
      Natural Language ProcessingRepresentationsLearningText Classification
    • by 
    •   4  
      Economic policyDeveloping CountryGovernment RegulationMajority voting
The N-Modular Redundancy (NMR) architecture has shown to perform fault-masking with acceptable cost and performance. The restriction to the majority voting imposed by many of its implementation models often discourages its use in... more
    • by 
    •   4  
      Computer ScienceReal TimeReal Time ApplicationMajority voting
    • by 
    •   20  
      Mathematical SciencesElectron TransferCurrent DensityHigh Electron Mobility Transistors
    • by 
    •   8  
      Decision MakingRisk assessmentProbabilistic Risk AssessmentUnited States
    • by 
    •   7  
      Cognitive ScienceDecision MakingComparative StudyClassification
    • by 
    •   12  
      Aerospace EngineeringGreedy AlgorithmsGaussian processesMaximum Likelihood
    • by 
    •   4  
      DeterrenceApplied EconomicsEuropean Political EconomyMajority voting
    • by 
    •   6  
      Time SeriesFeature SelectionRandom ForestSupport vector machine
    • by 
    •   4  
      Pattern RecognitionOracleElectrical And Electronic EngineeringMajority voting
Abstract— Gender classification problem is an active area of research; recently it had attracted many researchers. This study presents an efficient gender classification technique. Weighted Majority Voting (WMV) is the most popular... more
    • by 
    •   15  
      Computer ScienceGenetic AlgorithmsSupport Vector MachinesGenetic Algorithm
    • by 
    •   8  
      MathematicsApplied MathematicsComputer ScienceIndexation
In this paper, we investigate the possible externalities due to a minimum wage policy in an integrated market. We examine both descriptive and normative perspectives. We consider two identical countries for whom comparative advantage is... more
    • by 
    •   8  
      EconomicsPolitical EconomySocial ProtectionApplied Economics
    • by 
    •   9  
      Computer ScienceBrain Computer InterfaceEntropyNoise
    • by 
    •   13  
      Set TheoryComputer ScienceProbabilityBiomedical Imaging
A script independent recognition scheme for handwritten characters using multiple MLP classifiers and wavelet transform-based multiresolution pixel features is presented. We studied four different approaches for combination of multiple... more
    • by 
    •   6  
      Wavelet TransformWavelet TransformsNetwork ArchitectureIWFHR
    • by 
    •   7  
      Information SystemsOrganizational LearningLibrary and Information StudiesAccounting Information System
Proactive contact campaigns play a growing role in modern contact centers. Their traditional usage as a telemarketing tool now is widely extended to different types of service notifications. In this paper we describe the most common model... more
    • by 
    •   14  
      Modeling and SimulationCellular AutomataNeural NetworkFunctional Verification
    • by 
    •   18  
      Computer ScienceExpert SystemsStatisticsData Mining
ABSTRACT One problem in the field of machine learning is that the performance on the training and validation sets lack robustness when applied in real-life situations. Recent advances in ensemble methods have demonstrated that robust... more
    • by 
    •   11  
      Computer ScienceMachine LearningClassifier SystemBinary Classification
    • by 
    •   6  
      Political EconomyEuropean integrationPolitical SciencePublic Good
An electronic version of the paper may be downloaded • from the SSRN website: www.SSRN.com • from the RePEc website: www.RePEc.org • from the CESifo website: Twww.CESifo-group.deT
    • by 
    •   11  
      EconomicsPolitical EconomyApplied Economics LettersProfitability
The problem of the aggregation of consistent individual judgments on logically interconnected propositions into a collective judgment on the same propositions has recently drawn much attention. The difficulty lies in the fact that a... more
    • by 
    •   4  
      PsychologyEpistemologyJudgment AggregationMajority voting
    • by 
    •   8  
      LawEuropean LawJudicial reviewHuman right
    • by 
    •   8  
      EconomicsHigher EducationSecondary EducationEducational Standards
    • by 
    •   6  
      Political SciencePublic ChoiceApplied EconomicsEquilibrium
In this paper three different approaches for person verification and identification, ie by means of fingerprints, face and voice recognition, are studied. Face recognition uses parts-based representation methods and a manifold learning... more
    • by 
    •   12  
      Image ProcessingSpeaker RecognitionPattern RecognitionFace Recognition
Abstract— Gender classification problem is an active area of research; recently it had attracted many researchers. This study presents an efficient gender classification technique. Weighted Majority Voting (WMV) is the most popular... more
    • by 
    •   15  
      Computer ScienceGenetic AlgorithmsSupport Vector MachinesGenetic Algorithm
Segmentation of optical images may be obtained through algorithms based on image prior models that exploit the spatial dependencies of land covers. In synthetic aperture radar (SAR) images, speckle conceals such spatial dependencies and... more
    • by 
    •   18  
      Computer ScienceRemote SensingMarkov ProcessesImage segmentation
    • by 
    •   16  
      Cognitive ScienceComputer ScienceComputer VisionLanguage Acquisition
    • by 
    •   9  
      EconomicsEconomyPublic GoodPublic Goods
    • by 
    •   12  
      Computer ScienceStatistical AnalysisImage segmentationProcessing Speed
The thesis presented here analyzes the role of the less developed countries in the environmental issues in the United Nations, evaluates their influence, and analyzes the determinants of this influence. Our study assumes certain goal... more
    • by 
    •   13  
      International RelationsPolitical ScienceInternational Political EconomyUnited Nations
This paper defines a measure of bargaining uncertainty that quantifies Roth's concept of strategic risk. It shows how this measure can be used for checking reliability of the Shapley value in cost allocation problems and in the theory... more
    • by 
    •   7  
      MathematicsComputer ScienceEconomicsGame Theory
    • by 
    •   6  
      EconomicsPolitical EconomyEuropean Economic IntegrationEducational Finance
In this paper, we analyze the equilibrium on the market for schooling where both public and private schools coexist and where individuals are differentiated by income and ability. We introduce a non linear in means model of peer effect by... more
    • by 
    •   8  
      EconomicsSchool ChoiceEducation SystemPrice Discrimination
    • by 
    •   4  
      EconomicsPolitical ScienceSocial ChoiceMajority voting
    • by 
    •   4  
      Computer ScienceEconomicsEconomic TheoryMajority voting
Web spam can significantly deteriorate the quality of search engine results. Thus there is a large incentive for commercial search engines to detect spam pages efficiently and accurately. In this paper we present a spam detection system... more
    • by 
    •   6  
      Search EngineSpam DetectionWeb PagesLarge Scale
    • by 
    •   5  
      Fault ToleranceDependabilityReal Time SystemsRedundancy
    • by 
    •   7  
      EconomicsHigher EducationSecondary EducationEducational Standards