Sciweavers

5948 search results - page 996 / 1190
» Computing Robust Counter-Strategies
Sort
View
CIKM
2009
Springer
15 years 10 months ago
Fragment-based clustering ensembles
Clustering ensembles combine different clustering solutions into a single robust and stable one. Most of existing methods become highly time-consuming when the data size turns to ...
Ou Wu, Mingliang Zhu, Weiming Hu
135
Voted
CIVR
2009
Springer
169views Image Analysis» more  CIVR 2009»
15 years 10 months ago
Exploiting contextual data for event retrieval in surveillance video
Contextual information is vital for the robust extraction of semantic information in automated surveillance systems. We have developed a scene independent framework for the detect...
Philip Kelly, Ciarán O. Conaire, Noel E. O'...
GECCO
2009
Springer
135views Optimization» more  GECCO 2009»
15 years 10 months ago
Neuroevolutionary reinforcement learning for generalized helicopter control
Helicopter hovering is an important challenge problem in the field of reinforcement learning. This paper considers several neuroevolutionary approaches to discovering robust cont...
Rogier Koppejan, Shimon Whiteson
ICARIS
2009
Springer
15 years 10 months ago
A Sense of 'Danger' for Windows Processes
The sophistication of modern computer malware demands run-time malware detection strategies which are not only efficient but also robust to obfuscation and evasion attempts. In thi...
Salman Manzoor, M. Zubair Shafiq, S. Momina Tabish...
ICB
2009
Springer
185views Biometrics» more  ICB 2009»
15 years 10 months ago
Pose Invariant Palmprint Recognition
Abstract. A palmprint based authentication system that can work with a multipurpose camera in uncontrolled circumstances, such as those mounted on a laptop, mobile device or those ...
Chhaya Methani, Anoop M. Namboodiri