Sciweavers

863 search results - page 141 / 173
» Computational Methods for Intelligent Information Access
Sort
View
136
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 4 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
127
Voted
IDA
2009
Springer
15 years 10 months ago
Estimating Markov Random Field Potentials for Natural Images
Markov Random Field (MRF) models with potentials learned from the data have recently received attention for learning the low-level structure of natural images. A MRF provides a pri...
Urs Köster, Jussi T. Lindgren, Aapo Hyvä...
121
Voted
ICAT
2006
IEEE
15 years 9 months ago
An Initialization Tool for Installing Visual Markers in Wearable Augmented Reality
Abstract. It is necessary to precisely measure pose (position and orientation) of a user in order to realize an augmented reality (AR) system with a wearable computer. One of major...
Yusuke Nakazato, Masayuki Kanbara, Naokazu Yokoya
120
Voted
KES
2004
Springer
15 years 9 months ago
Chance Discovery with Emergence of Future Scenarios
A "chance" is an event or a situation significant for making a decision in a complex environment. Since we organized a session of Chance Discovery in KES 2000, the basic...
Yukio Ohsawa
133
Voted
GECCO
2007
Springer
213views Optimization» more  GECCO 2007»
15 years 7 months ago
Aspects of adaptation in natural and artificial evolution
This work addresses selected aspects of natural evolution, especially of the field of population genetics, that are considered to be meaningful for algorithmic further development...
Michael Affenzeller, Stefan Wagner 0002, Stephan M...