Sciweavers

381 search results - page 60 / 77
» Probabilistic Event Extraction from RFID Data
Sort
View
ICASSP
2011
IEEE
14 years 1 months ago
Well-calibrated heavy tailed Bayesian speaker verification for microphone speech
The work presented in this paper is an extension of our two previous works [1, 2]. In the first paper [1], we proposed a low dimensional feature (i-vectors) extractor which is su...
Mohammed Senoussaoui, Patrick Kenny, Pierre Dumouc...
SAINT
2003
IEEE
15 years 3 months ago
Exploiting Pattern Relationship for Intrusion Detection
The problem of identifying patterns from system call trails of UNIX processes to better model application behavior has been investigated intensively. Most existing approaches focu...
Ning Jiang, Kien A. Hua, Jung-Hwan Oh
ICPR
2008
IEEE
15 years 11 months ago
Visual features with semantic combination using Bayesian network for a more effective image retrieval
In many vision problems, instead of having fully annotated training data, it is easier to obtain just a subset of data with annotations, because it is less restrictive for the use...
Sabine Barrat, Salvatore Tabbone
PAMI
2008
156views more  PAMI 2008»
14 years 9 months ago
Tied Factor Analysis for Face Recognition across Large Pose Differences
Face recognition algorithms perform very unreliably when the pose of the probe face is different from the gallery face: typical feature vectors vary more with pose than with identi...
Simon J. D. Prince, James H. Elder, Jonathan Warre...
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
14 years 8 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...