Sciweavers

2884 search results - page 266 / 577
» Evaluating learning algorithms and classifiers
Sort
View
89
Voted
ICIP
2007
IEEE
15 years 4 months ago
Robust lip Localization on Multi-View Faces in Video
In this paper, a fast and robust multi-view lip localization algorithm in video is proposed. We consider lip localization as a binary classification problem, where a classifier is...
Yi Wu, Rui Ma, Wei Hu, Tao Wang, Yimin Zhang, Jian...
117
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 7 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
CHI
2008
ACM
16 years 26 days ago
Investigating statistical machine learning as a tool for software development
As statistical machine learning algorithms and techniques continue to mature, many researchers and developers see statistical machine learning not only as a topic of expert study,...
Kayur Patel, James Fogarty, James A. Landay, Bever...
99
Voted
ISCI
2008
166views more  ISCI 2008»
15 years 14 days ago
A discretization algorithm based on Class-Attribute Contingency Coefficient
Discretization algorithms have played an important role in data mining and knowledge discovery. They not only produce a concise summarization of continuous attributes to help the ...
Cheng-Jung Tsai, Chien-I Lee, Wei-Pang Yang
RAID
2000
Springer
15 years 4 months ago
A Real-Time Intrusion Detection System Based on Learning Program Behavior
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...