Sciweavers

3716 search results - page 708 / 744
» On the monotonization of the training set
Sort
View
106
Voted
ICIW
2008
IEEE
15 years 7 months ago
Evaluating the Use of AOP and MDA in Web Service Development
— Model-Driven Architecture (MDA) is introduced to shorten the software development time, produce better quality of code and promote the reuse of software artifacts. On the other...
Guadalupe Ortiz, Behzad Bordbar, Juan Herná...
IJCNN
2007
IEEE
15 years 6 months ago
Using Artificial Neural Networks and Feature Saliency Techniques for Improved Iris Segmentation
—One of the basic challenges to robust iris recognition is iris segmentation. This paper proposes the use of a feature saliency algorithm and an artificial neural network to perf...
Randy P. Broussard, Lauren R. Kennell, David L. So...
105
Voted
IROS
2007
IEEE
157views Robotics» more  IROS 2007»
15 years 6 months ago
View-adaptive manipulative action recognition for robot companions
— This paper puts forward an approach for a mobile robot to recognize the human’s manipulative actions from different single camera views. While most of the related work in act...
Zhe Li, Sven Wachsmuth, Jannik Fritsch, Gerhard Sa...
SMC
2007
IEEE
156views Control Systems» more  SMC 2007»
15 years 6 months ago
Dynamic fusion of classifiers for fault diagnosis
—This paper considers the problem of temporally fusing classifier outputs to improve the overall diagnostic classification accuracy in safety-critical systems. Here, we discuss d...
Satnam Singh, Kihoon Choi, Anuradha Kodali, Krishn...
106
Voted
CCS
2007
ACM
15 years 6 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen