287 research outputs found

    Method of solution

    Get PDF
    A basis set is constructed as the product of Morse oscillato

    February16,2007 Acknowledgements

    No full text
    (The abilityto maskorlimit accessto health data) by JoyPrits,JD KathleenConnor,MP

    Dissimilarity-based classification for vectorial representations

    No full text
    General dissimilarity-based learning approaches have been proposed for dissimilarity data sets [11, 10]. They arise in problems in which direct comparisons of objects are made, e.g. by computing pairwise distances between images, spectra, graphs or strings. In this paper, we study under which circumstances such dissimilarity-based techniques can be used for deriving classifiers in feature vector spaces. We will show that such classifiers perform comparably or better than the nearest neighbor rule based either on the entire or condensed training set. Moreover, they can be beneficial for highlyoverlapping classes and for non-normally distributed data sets, with categorical, mixed or otherwise difficult features. 1

    EDITORIAL The Clumsy Child: Where Are We and Where Are We Going? In June 2002, a meeting was held in Groningen,

    No full text
    neuroscientists who presented recent findings on the organization and development of motor control met clinicians involved in the management and-.care of children with clumsy motor behavior. The present special issue of Neural Plasticity contains the main contributions of this meeting, as well as an edited version of the lively discussion held at the end of the meeting. The issue begins with the paper of Henderson and Henderson who eloquently describe all the difficulties that researchers run into when dealing with children with clumsy motor behavior. To avoid difficulties with terminology, they plea for the general use of the DSM-IV term Developmental Coordination Disorder (DCD, American Psychiatric Association, 1994) to describe thi

    Jihadists and the Internet 2009 update National Coordinator for Counterterrorism (NCTb)

    No full text
    an important role on behalf of the government in the battle against cybercrime (including terrorism via the Internet). These organisations regularly consult on incidents and developments relating to this theme, and in their reports they try to provide as complete a picture as possible of the most important trends. Foreword During the last decade the greatest terrorist threat has comes from what is referred to as ‘jihadist terrorism’. Certainly since 11 September 2001, many bloody terrorist attacks have been carried out under pretext of a religious armed struggle, known as the ‘jihad’. The NCTb already established, at the start of 2007, that jihadists were using the Internet widely as a resource for propaganda, for example, or to recruit people. The NCTb also investigated the threat of terrorist attacks against the Internet (Internet as a target) or via the Internet (Internet as a weapon). Both the Internet and jihadism are continuing to develop. That is why it became necessary to review the original assessment of the threat in the form of this ‘2009 update’. After all, the government and private parties cannot afford to relax and let developments simply run their course. Therefore, since the publication of the earlier study at the beginning of 2007, numerous measures have been taken to counteract the threat based on Internet use by jihadists. Although this study shows that the threat has not substantially changed, the findings in this study provide useful guidelines on how to continue to respond adequately to the threat

    INTERPOLATION Stationary Nonlinear Subdivision and Splines

    No full text
    Copyright c â—‹ 1998 by F. Kuij

    A Decade of Business Process Management Conferences: Personal Reflections on a Developing Discipline

    No full text
    www.vdaalst.com Abstract. The Business Process Management (BPM) conference series celebrates its tenth anniversary. This is a nice opportunity to reflect on a decade of BPM research. This paper describes the history of the conference series, enumerates twenty typical BPM use cases, and identifies six key BPM concerns: process modeling languages, process enactment infrastructures, process model analysis, process mining, process flexibility, and process reuse. Although BPM matured as a research discipline, there are still various important open problems. Moreover, despite the broad interest in BPM, the adoption of state-of-the-art results by software vendors, consultants, and end-users leaves much to be desired. Hence, the BPM discipline should not shy away from the key challenges and set clear targets for the next decade
    • …
    corecore