Sciweavers

159 search results - page 17 / 32
» Strategy evaluation in extensive games with importance sampl...
Sort
View
NDSS
2008
IEEE
15 years 4 months ago
HookFinder: Identifying and Understanding Malware Hooking Behaviors
Installing various hooks into the victim system is an important attacking strategy employed by malware, including spyware, rootkits, stealth backdoors, and others. In order to def...
Heng Yin, Zhenkai Liang, Dawn Song
88
Voted
ICCV
2011
IEEE
13 years 9 months ago
Sparse Representation or Collaborative Representation: Which Helps Face Recognition?
As a recently proposed technique, sparse representation based classification (SRC) has been widely used for face recognition (FR). SRC first codes a testing sample as a sparse lin...
Lei Zhang, Meng Yang, Xiangchu Feng
AAAI
2006
14 years 11 months ago
Using Anticipation to Create Believable Behaviour
Although anticipation is an important part of creating believable behaviour, it has had but a secondary role in the field of life-like characters. In this paper, we show how a sim...
Carlos Martinho, Ana Paiva
AIME
2003
Springer
15 years 2 months ago
Learning-Free Text Categorization
In this paper, we report on the fusion of simple retrieval strategies with thesaural resources in order to perform large-scale text categorization tasks. Unlike most related system...
Patrick Ruch, Robert H. Baud, Antoine Geissbü...
ECCV
2004
Springer
15 years 11 months ago
Stretching Bayesian Learning in the Relevance Feedback of Image Retrieval
This paper is about the work on user relevance feedback in image retrieval. We take this problem as a standard two-class pattern classification problem aiming at refining the retri...
Ruofei Zhang, Zhongfei (Mark) Zhang