Sciweavers

1298 search results - page 166 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
136
Voted
WACV
2005
IEEE
15 years 9 months ago
Using Co-Occurrence and Segmentation to Learn Feature-Based Object Models from Video
A number of recent systems for unsupervised featurebased learning of object models take advantage of cooccurrence: broadly, they search for clusters of discriminative features tha...
Thomas S. Stepleton, Tai Sing Lee
128
Voted
JFR
2006
88views more  JFR 2006»
15 years 3 months ago
Discovering natural kinds of robot sensory experiences in unstructured environments
We derive categories directly from robot sensor data to address the symbol grounding problem. Unlike model-based approaches where human intuitive correspondences are sought betwee...
Daniel H. Grollman, Odest Chadwicke Jenkins, Frank...
160
Voted
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 9 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
MTSR
2007
Springer
15 years 9 months ago
Creating and Querying an Integrated Ontology for Molecular and Phenotypic Cereals Data
In this paper we describe the development of an ontology of molecular and phenotypic cereals data, realized by integrating existing public web databases with the database developed...
Sonia Bergamaschi, Antonio Sala 0002
154
Voted

Publication
922views
16 years 10 months ago
Multi-Class Active Learning for Image Classification
One of the principal bottlenecks in applying learning techniques to classification problems is the large amount of labeled training data required. Especially for images and video, ...
Ajay J. Joshi, Fatih Porikli, Nikolaos Papanikolop...