Sciweavers

1682 search results - page 276 / 337
» Applying Conventional Testing Techniques for Class Testing
Sort
View
CVPR
2008
IEEE
16 years 5 months ago
Mining compositional features for boosting
The selection of weak classifiers is critical to the success of boosting techniques. Poor weak classifiers do not perform better than random guess, thus cannot help decrease the t...
Junsong Yuan, Jiebo Luo, Ying Wu
146
Voted
IJCV
2006
112views more  IJCV 2006»
15 years 3 months ago
Non-Single Viewpoint Catadioptric Cameras: Geometry and Analysis
Conventional vision systems and algorithms assume the imaging system to have a single viewpoint. However, these imaging systems need not always maintain a single viewpoint. For ins...
Rahul Swaminathan, Michael D. Grossberg, Shree K. ...
125
Voted
ICIP
2008
IEEE
16 years 5 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
226
Voted
ICDE
2004
IEEE
133views Database» more  ICDE 2004»
16 years 5 months ago
GenExplore: Interactive Exploration of Gene Interactions from Microarray Data
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
ICSE
2007
IEEE-ACM
16 years 3 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...