Skip to main content

Showing 1–3 of 3 results for author: Melo, E F

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.13124  [pdf, ps, other

    stat.ME cs.LG stat.ML

    Conformal prediction for frequency-severity modeling

    Authors: Helton Graziadei, Paulo C. Marques F., Eduardo F. L. de Melo, Rodrigo S. Targino

    Abstract: We present a nonparametric model-agnostic framework for building prediction intervals of insurance claims, with finite sample statistical guarantees, extending the technique of split conformal prediction to the domain of two-stage frequency-severity modeling. The effectiveness of the framework is showcased with simulated and real datasets. When the underlying severity model is a random forest, we… ▽ More

    Submitted 27 July, 2023; v1 submitted 24 July, 2023; originally announced July 2023.

  2. arXiv:2005.02858  [pdf, other

    cs.NI cs.PF

    An Overview of Self-Similar Traffic: Its Implications in the Network Design

    Authors: Ernande F. Melo, H. M. de Oliveira

    Abstract: The knowledge about the true nature of the traffic in computer networking is a key requirement in the design of such networks. The phenomenon of self-similarity is a characteristic of the traffic of current client/server packet networks in LAN/WAN environments dominated by network technologies such as Ethernet and the TCP/IP protocol stack. The development of networks traffic simulators, which tak… ▽ More

    Submitted 6 May, 2020; originally announced May 2020.

    Comments: 9 pages, 16 figures

    Report number: ISSN 2237-5104 ACM Class: C.2.1; C.4; D.4.8; I.6

    Journal ref: Revista de Tecnologia da Informação e Comunicação, v. 9, n. 1, p. 38-46, May 2020

  3. arXiv:1502.01880  [pdf

    cs.CV cs.CR stat.AP

    A Fingerprint-based Access Control using Principal Component Analysis and Edge Detection

    Authors: E. F. Melo, H. M. de Oliveira

    Abstract: This paper presents a novel approach for deciding on the appropriateness or not of an acquired fingerprint image into a given database. The process begins with the assembly of a training base in an image space constructed by combining Principal Component Analysis (PCA) and edge detection. Then, the parameter H, a new feature that helps in the decision making about the relevance of a fingerprint im… ▽ More

    Submitted 6 February, 2015; originally announced February 2015.

    Comments: 5 pages, 9 figures. SBrT/IEEE International Telecommunication Symposium, ITS 2010, Manaus, AM, Brazil