Sciweavers

536 search results - page 32 / 108
» Evaluating Metrical Phonology - a Computational- Empirical A...
Sort
View
TCSV
2008
166views more  TCSV 2008»
14 years 11 months ago
A Framework for Evaluating Stereo-Based Pedestrian Detection Techniques
Automated pedestrian detection, counting, and tracking have received significant attention in the computer vision community of late. As such, a variety of techniques have been inve...
Philip Kelly, Noel E. O'Connor, Alan F. Smeaton
95
Voted
JPDC
2007
86views more  JPDC 2007»
14 years 11 months ago
Performance evaluation of a new scheduling algorithm for distributed systems with security heterogeneity
High quality of security is increasingly critical for applications running on heterogeneous distributed systems. However, existing scheduling algorithms for heterogeneous distribu...
Tao Xie 0004, Xiao Qin
IWDC
2004
Springer
120views Communications» more  IWDC 2004»
15 years 5 months ago
SCIDS: A Soft Computing Intrusion Detection System
An Intrusion Detection System (IDS) is a program that analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. Th...
Ajith Abraham, Ravi Jain, Sugata Sanyal, Sang-Yong...
WACV
2005
IEEE
15 years 5 months ago
Semi-Supervised Self-Training of Object Detection Models
The construction of appearance-based object detection systems is time-consuming and difficult because a large number of training examples must be collected and manually labeled i...
Chuck Rosenberg, Martial Hebert, Henry Schneiderma...
AAAI
2010
15 years 1 months ago
Using Bisimulation for Policy Transfer in MDPs
Knowledge transfer has been suggested as a useful approach for solving large Markov Decision Processes. The main idea is to compute a decision-making policy in one environment and...
Pablo Samuel Castro, Doina Precup