Sciweavers

121 search results - page 24 / 25
» To aggregate or not to aggregate high-dimensional classifier...
Sort
View
VIP
2003
13 years 6 months ago
Using Dual Cascading Learning Frameworks for Image Indexing
To bridge the semantic gap in content-based image retrieval, detecting meaningful visual entities (e.g. faces, sky, foliage, buildings etc) in image content and classifying images...
Joo-Hwee Lim, Jesse S. Jin
AHSWN
2006
206views more  AHSWN 2006»
13 years 4 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
JMLR
2006
113views more  JMLR 2006»
13 years 4 months ago
On Inferring Application Protocol Behaviors in Encrypted Network Traffic
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
TMI
2002
191views more  TMI 2002»
13 years 4 months ago
Automatic Detection of Abnormalities in Chest Radiographs Using Local Texture Analysis
A fully automatic method is presented to detect abnormalities in frontal chest radiographs which are aggregated into an overall abnormality score. The method is aimed at finding ab...
Bram van Ginneken, Shigehiko Katsuragawa, Bart M. ...
TMC
2010
112views more  TMC 2010»
13 years 3 months ago
Comparison of Data-Driven Link Estimation Methods in Low-Power Wireless Networks
Abstract—Link estimation is a basic element of routing in lowpower wireless networks, and data-driven link estimation using unicast MAC feedback has been shown to outperform broa...
Hongwei Zhang, Lifeng Sang, Anish Arora