Sciweavers

14386 search results - page 2545 / 2878
» Algorithms for user interfaces
Sort
View
197
Voted
PR
2010
141views more  PR 2010»
14 years 11 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
TEC
2010
77views more  TEC 2010»
14 years 11 months ago
On Set-Based Multiobjective Optimization
Abstract--Assuming that evolutionary multiobjective optimization (EMO) mainly deals with set problems, one can identify three core questions in this area of research: (i) how to fo...
Eckart Zitzler, Lothar Thiele, Johannes Bader
TOMCCAP
2010
202views more  TOMCCAP 2010»
14 years 11 months ago
Audio-visual atoms for generic video concept classification
We investigate the challenging issue of joint audio-visual analysis of generic videos targeting at semantic concept detection. We propose to extract a novel representation, the Sh...
Wei Jiang, Courtenay V. Cotton, Shih-Fu Chang, Dan...
CVPR
2011
IEEE
14 years 8 months ago
Multi-label Learning with Incomplete Class Assignments
We consider a special type of multi-label learning where class assignments of training examples are incomplete. As an example, an instance whose true class assignment is (c1, c2, ...
Serhat Bucak, Rong Jin, Anil Jain
ICASSP
2011
IEEE
14 years 8 months ago
Beamforming design for multi-user two-way relaying with MIMO amplify and forward relays
Relays represent a promising approach to extend the cell coverage, combat the strong shadowing effects as well as guarantee the QoS in dense networks. Among the numerous existing ...
Jianshu Zhang, Florian Roemer, Martin Haardt
« Prev « First page 2545 / 2878 Last » Next »