Sciweavers

65 search results - page 13 / 13
» Multiple Classifier Systems under Attack
Sort
View
89
Voted
NDSS
2007
IEEE
15 years 3 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
105
Voted
CVPR
2005
IEEE
15 years 11 months ago
A Two Level Approach for Scene Recognition
Classifying pictures into one of several semantic categories is a classical image understanding problem. In this paper, we present a stratified approach to both binary (outdoor-in...
Le Lu, Kentaro Toyama, Gregory D. Hager
ATAL
2010
Springer
14 years 9 months ago
Inter-robot transfer learning for perceptual classification
We introduce the novel problem of inter-robot transfer learning for perceptual classification of objects, where multiple heterogeneous robots communicate and transfer learned obje...
Zsolt Kira
WWW
2003
ACM
15 years 10 months ago
Design, implementation, and evaluation of a client characterization driven web server
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...
VLDB
2005
ACM
140views Database» more  VLDB 2005»
15 years 3 months ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu