Sciweavers

1935 search results - page 176 / 387
» E-Learning Applied To Computer Vision
Sort
View
ICPR
2008
IEEE
15 years 9 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi
CAE
2007
15 years 5 months ago
Conceptualizing Birkhoff's Aesthetic Measure Using Shannon Entropy and Kolmogorov Complexity
In 1928, George D. Birkhoff introduced the Aesthetic Measure, defined as the ratio between order and complexity, and, in 1965, Max Bense analyzed Birkhoff's measure from an i...
Jaume Rigau, Miquel Feixas, Mateu Sbert
128
Voted
BMVC
2010
15 years 19 days ago
Patch-Cuts: A Graph-Based Image Segmentation Method Using Patch Features and Spatial Relations
In this paper, we present a graph-based image segmentation method (patch-cuts) that incorporates features and spatial relations obtained from image patches. In the first step, pat...
Gerd Brunner, Deepak Roy Chittajallu, Uday Kurkure...
129
Voted
BMVC
2010
15 years 19 days ago
Weakly Supervised Object Recognition and Localization with Invariant High Order Features
High order features have been proposed to incorporate geometrical information into the "bag of feature" representation. We propose algorithms to perform fast weakly supe...
Yimeng Zhang, Tsuhan Chen
125
Voted
ISMAR
2007
IEEE
15 years 9 months ago
A Method for Predicting Marker Tracking Error
Many Augmented Reality (AR) applications use marker-based vision tracking systems to recover camera pose by detecting one or more planar landmarks. However, most of these systems ...
Russell M. Freeman, Simon J. Juliet, Anthony Steed