Sciweavers

2740 search results - page 340 / 548
» Approximating Component Selection
Sort
View
JSS
2002
198views more  JSS 2002»
15 years 2 months ago
Automated discovery of concise predictive rules for intrusion detection
This paper details an essential component of a multi-agent distributed knowledge network system for intrusion detection. We describe a distributed intrusion detection architecture...
Guy G. Helmer, Johnny S. Wong, Vasant Honavar, Les...
TMM
2002
94views more  TMM 2002»
15 years 2 months ago
A jointly optimal fractal/DCT compression scheme
In this paper a hybrid fractal and Discrete Cosine transform (DCT) coder is developed. Drawing on the ability of DCT to remove inter-pixel redundancies and on the ability of fracta...
Gerry Melnikov, Aggelos K. Katsaggelos
ISCI
2008
95views more  ISCI 2008»
15 years 2 months ago
Modified constrained learning algorithms incorporating additional functional constraints into neural networks
In this paper, two modified constrained learning algorithms are proposed to obtain better generalization performance and faster convergence rate. The additional cost terms of the ...
Fei Han, Qing-Hua Ling, De-Shuang Huang
PAMI
2007
155views more  PAMI 2007»
15 years 2 months ago
Localization of Shapes Using Statistical Models and Stochastic Optimization
—In this paper, we present a new model for deformations of shapes. A pseudolikelihood is based on the statistical distribution of the gradient vector field of the gray level. The...
François Destrempes, Max Mignotte, Jean-Fra...
JASIS
2010
125views more  JASIS 2010»
15 years 1 months ago
So mechanical or routine: The not original in Feist
The United States Supreme Court case of 1991, Feist Publications, Inc. v. Rural Tel. Service Co., continues to be highly significant for property in data and databases but remains...
Julian Warner