Sciweavers

1414 search results - page 276 / 283
» Combining Intruder Theories
Sort
View
TNN
1998
121views more  TNN 1998»
14 years 9 months ago
Detection of mines and minelike targets using principal component and neural-network methods
— This paper introduces a new system for real-time detection and classification of arbitrarily scattered surface-laid mines from multispectral imagery data of a minefield. The ...
Xi Miao, Mahmood R. Azimi-Sadjadi, Bin Tan, A. C. ...
TON
2002
86views more  TON 2002»
14 years 9 months ago
Efficient randomized web-cache replacement schemes using samples from past eviction times
The problem of document replacement in web caches has received much attention in recent research, and it has been shown that the eviction rule "replace the least recently used...
Konstantinos Psounis, Balaji Prabhakar
PAMI
2007
107views more  PAMI 2007»
14 years 9 months ago
Recognition of Pornographic Web Pages by Classifying Texts and Images
—With the rapid development of the World Wide Web, people benefit more and more from the sharing of information. However, Web pages with obscene, harmful, or illegal content can ...
Weiming Hu, Ou Wu, Zhouyao Chen, Zhouyu Fu, Stephe...
86
Voted
PRL
2007
108views more  PRL 2007»
14 years 9 months ago
Towards a measure of deformability of shape sequences
In this paper we develop a theory for characterizing how deformable a shape is given a sequence of its observations. We define a term called ‘‘deformability index’’ (DI) ...
Amit K. Roy Chowdhury
CIKM
2010
Springer
14 years 8 months ago
Decomposing background topics from keywords by principal component pursuit
Low-dimensional topic models have been proven very useful for modeling a large corpus of documents that share a relatively small number of topics. Dimensionality reduction tools s...
Kerui Min, Zhengdong Zhang, John Wright, Yi Ma