Sciweavers

1414 search results - page 226 / 283
» Combining Intruder Theories
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Horror video scene recognition via Multiple-Instance learning
Along with the ever-growing Web comes the proliferation of objectionable content, such as pornography, violence, horror information, etc. Horror videos, whose threat to childrens ...
Jianchao Wang, Bing Li, Weiming Hu, Ou Wu
WIOPT
2011
IEEE
14 years 1 months ago
LIFO-Backpressure achieves near optimal utility-delay tradeoff
There has been considerable recent work developing a new stochastic network utility maximization framework using Backpressure algorithms, also known as MaxWeight. A key open probl...
Longbo Huang, Scott Moeller, Michael J. Neely, Bha...
ESOP
2011
Springer
14 years 1 months ago
Measure Transformer Semantics for Bayesian Machine Learning
Abstract. The Bayesian approach to machine learning amounts to inferring posterior distributions of random variables from a probabilistic model of how the variables are related (th...
Johannes Borgström, Andrew D. Gordon, Michael...
JOCN
2011
92views more  JOCN 2011»
14 years 20 days ago
Rapid Modulation of Sensory Processing Induced by Stimulus Conflict
■ Humans are constantly confronted with environmental stimuli that conflict with task goals and can interfere with successful behavior. Prevailing theories propose the existence...
Lawrence G. Appelbaum, David V. Smith, Carsten Nic...
AAAI
2012
13 years 5 days ago
Security Games for Controlling Contagion
Many strategic actions carry a ‘contagious’ component beyond the immediate locale of the effort itself. Viral marketing and peacekeeping operations have both been observed to ...
Jason Tsai, Thanh H. Nguyen, Milind Tambe