Sciweavers

1997 search results - page 46 / 400
» A Model for Data Leakage Detection
Sort
View
CLOR
2006
15 years 3 months ago
Synergistic Face Detection and Pose Estimation with Energy-Based Models
We describe a novel method for real-time, simultaneous multi-view face detection and facial pose estimation. The method employs a convolutional network to map face images to point...
Margarita Osadchy, Yann LeCun, Matthew L. Miller
BMVC
2010
14 years 9 months ago
Image Topic Discovery with Saliency Detection
This work proposes a biologically inspired approach to integrate latent topic model with saliency detection. Firstly, a saliency detection algorithm is presented to discriminate s...
Zhidong Li, Yang Wang, Jing Chen, Jie Xu, John Lai...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 6 days ago
ADMIT: anomaly-based data mining for intrusions
Security of computer systems is essential to their acceptance and utility. Computer security analysts use intrusion detection systems to assist them in maintaining computer system...
Karlton Sequeira, Mohammed Javeed Zaki
ICDM
2008
IEEE
224views Data Mining» more  ICDM 2008»
15 years 6 months ago
A Non-parametric Approach to Pair-Wise Dynamic Topic Correlation Detection
We introduce dynamic correlated topic models (DCTM) for analyzing discrete data over time. This model is inspired by the hierarchical Gaussian process latent variable models (GP-L...
Yang Song, Lu Zhang 0007, C. Lee Giles
KDD
2001
ACM
228views Data Mining» more  KDD 2001»
16 years 6 days ago
REVI-MINER, a KDD-environment for deviation detection and analysis of warranty and goodwill cost statements in automotive indust
REVI-MINER is a KDD-environment which supports the detection and analysis of deviations in warranty and goodwill cost statements. The system was developed within the framework of ...
Edgar Hotz, Udo Grimmer, W. Heuser, Gholamreza Nak...