Sciweavers

149 search results - page 28 / 30
» Gabor Feature Selection for Face Recognition Using Improved ...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 9 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
TASLP
2008
108views more  TASLP 2008»
13 years 5 months ago
A Regression Approach to Music Emotion Recognition
Content-based retrieval has emerged in the face of content explosion as a promising approach to information access. In this paper, we focus on the challenging issue of recognizing ...
Yi-Hsuan Yang, Yu-Ching Lin, Ya-Fan Su, Homer H. C...
ICCV
2005
IEEE
14 years 7 months ago
Building a Classification Cascade for Visual Identification from One Example
Object identification (OID) is specialized recognition where the category is known (e.g. cars) and the algorithm recognizes an object's exact identity (e.g. Bob's BMW). ...
Andras Ferencz, Erik G. Learned-Miller, Jitendra M...
WACV
2005
IEEE
13 years 11 months ago
Combining View-Based and Model-Based Tracking of Articulated Human Movements
Many existing systems for human body tracking are based on dynamic model-based tracking that is driven by local image features. Alternatively, within a view-based approach, tracki...
Cristóbal Curio, Martin A. Giese
ICPR
2004
IEEE
14 years 6 months ago
Neural Network-Based Proper Names Extraction in Fax Images
In this paper, we are interested in the sender's name extraction in fax cover pages through a machine learning scheme. For this purpose, two analysis methods are implemented ...
Laurence Likforman-Sulem, Noura Azzabou