Sciweavers

2960 search results - page 392 / 592
» Learning from Multiple Sources
Sort
View
ICTAI
2007
IEEE
15 years 10 months ago
Facial Image Retrieval through Compound Queries Using Constrained Independent Component Analysis
In this work we present a new technique of facial-image retrieval using constrained independent component analysis (cICA). We have employed cICA for the online extraction of those...
Bilal Ahmed, Tahir Rasheed, Young-Koo Lee, Sungyou...
124
Voted
ACSAC
2005
IEEE
15 years 9 months ago
Generating Policies for Defense in Depth
Coordinating multiple overlapping defense mechat differing levels of abstraction, is fraught with the potential for misconfiguration, so there is strong motivation to generate p...
Paul Rubel, Michael Ihde, Steven Harp, Charles Pay...
125
Voted
SPW
1999
Springer
15 years 8 months ago
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
In the near future, many personal electronic devices will be able to communicate with each other over a short range wireless channel. We investigate the principal security issues f...
Frank Stajano, Ross J. Anderson
100
Voted
SPLC
2008
15 years 5 months ago
Enabling Verifiable Conformance for Product Lines
NASA is, with the rest of industry, turning to product-line engineering to reduce costs and improve quality by effectively managing reuse. Experience in industry has shown that it...
Robyn R. Lutz
132
Voted
TNN
1998
114views more  TNN 1998»
15 years 3 months ago
A new approach to artificial neural networks
: A novel approach to artificial neural networks is presented. The philosophy of this approach is based on two aspects: the design of task-specific networks, and a new neuron model...
Benedito Dias Baptista F. Filho, Eduardo Lobo Lust...