Sciweavers

MM
2005
ACM
143views Multimedia» more  MM 2005»
13 years 9 months ago
Hierarchical voting classification scheme for improving visual sign language recognition
As one of the important research areas of multimodal interaction, sign language recognition (SLR) has attracted increasing interest. In SLR, especially on medium or large vocabula...
Liang-Guo Zhang, Xilin Chen, Chunli Wang, Wen Gao
ICCV
2005
IEEE
13 years 9 months ago
Priors for People Tracking from Small Training Sets
We advocate the use of Scaled Gaussian Process Latent Variable Models (SGPLVM) to learn prior models of 3D human pose for 3D people tracking. The SGPLVM simultaneously optimizes a...
Raquel Urtasun, David J. Fleet, Aaron Hertzmann, P...
ACSC
2005
IEEE
13 years 10 months ago
Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters
Most current network intrusion detection systems employ signature-based methods or data mining-based methods which rely on labelled training data. This training data is typically ...
Kingsly Leung, Christopher Leckie
ISWC
2006
IEEE
13 years 10 months ago
Towards Less Supervision in Activity Recognition from Wearable Sensors
Activity Recognition has gained a lot of interest in recent years due to its potential and usefulness for context-aware wearable computing. However, most approaches for activity r...
Tâm Huynh, Bernt Schiele
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
13 years 10 months ago
Action-selection and crossover strategies for self-modeling machines
In previous work [7] a computational framework was demonstrated that employs evolutionary algorithms to automatically model a given system. This is accomplished by alternating the...
Josh C. Bongard
ICIP
2007
IEEE
13 years 10 months ago
A VQ-Based Demosaicing by Self-Similarity
In this paper, we propose a learning-based demosaicing and a restoration error detection. A Vector Quantization (VQ)based method is utilized for learning. We take advantage of a s...
Yoshikuni Nomura, Shree K. Nayar
DASFAA
2007
IEEE
139views Database» more  DASFAA 2007»
13 years 10 months ago
Self-tuning in Graph-Based Reference Disambiguation
Nowadays many data mining/analysis applications use the graph analysis techniques for decision making. Many of these techniques are based on the importance of relationships among t...
Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad M...
SP
2008
IEEE
176views Security Privacy» more  SP 2008»
13 years 10 months ago
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
The efficacy of Anomaly Detection (AD) sensors depends heavily on the quality of the data used to train them. Artificial or contrived training data may not provide a realistic v...
Gabriela F. Cretu, Angelos Stavrou, Michael E. Loc...
ICTAI
2008
IEEE
13 years 10 months ago
Ensemble Learning of Regional Classifiers
We present a new ensemble learning method that employs a set of regional classifiers, each of which learns to handle a subset of the training data. We split the training data and ...
Byungwoo Lee, Yong-chan Na, Byonghwa Oh, Jihoon Ya...
ICPR
2008
IEEE
13 years 10 months ago
Boosting Gaussian mixture models via discriminant analysis
The Gaussian mixture model (GMM) can approximate arbitrary probability distributions, which makes it a powerful tool for feature representation and classification. However, it su...
Hao Tang, Thomas S. Huang