Sciweavers

259 search results - page 34 / 52
» Reinforcement Learning with the Use of Costly Features
Sort
View
100
Voted
ISBI
2007
IEEE
15 years 6 months ago
Multi-Resolution Image Segmentation Using the 2-Point Correlation Functions
Recently, the 2-point correlation functions (2-pcfs) were employed in building feature vectors for histological image segmentation. The 2-pcfs serve as estimators of material dist...
Firdaus Janoos, M. Okan Irfanoglu, Kishore Mosalig...
122
Voted
ICCV
2011
IEEE
14 years 15 days ago
Learning a Category Independent Object Detection Cascade
Cascades are a popular framework to speed up object detection systems. Here we focus on the first layers of a category independent object detection cascade in which we sample a l...
Esa Rahtu, Juho Kannala, Matthew Blaschko
121
Voted
PERCOM
2005
ACM
16 years 2 days ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
102
Voted
RAID
2000
Springer
15 years 4 months ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
114
Voted
PR
2007
205views more  PR 2007»
14 years 12 months ago
Active learning for image retrieval with Co-SVM
In relevance feedback algorithms, selective sampling is often used to reduce the cost of labeling and explore the unlabeled data. In this paper, we proposed an active learning alg...
Jian Cheng, Kongqiao Wang