Sciweavers

654 search results - page 69 / 131
» TRUST-TECH based Methods for Optimization and Learning
Sort
View
107
Voted
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
15 years 6 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
144
Voted
CVPR
2009
IEEE
16 years 7 months ago
Max-Margin Hidden Conditional Random Fields for Human Action Recognition
We present a new method for classification with structured latent variables. Our model is formulated using the max-margin formalism in the discriminative learning literature. We...
Yang Wang 0003, Greg Mori
EDUTAINMENT
2006
Springer
15 years 4 months ago
Research of Dynamic Terrain in Complex Battlefield Environments
In this paper, we present a novel method for dynamic terrain in battlefield and an efficient plan to simulate crater in the battle. We explore a few methods for dynamic terrain sur...
Xingquan Cai, Fengxia Li, Haiyan Sun, Shouyi Zhan
106
Voted
ICASSP
2010
IEEE
15 years 28 days ago
Hierarchical Gaussian Mixture Model
Gaussian mixture models (GMMs) are a convenient and essential tool for the estimation of probability density functions. Although GMMs are used in many research domains from image ...
Vincent Garcia, Frank Nielsen, Richard Nock
AAAI
2012
13 years 3 months ago
Semi-Supervised Kernel Matching for Domain Adaptation
In this paper, we propose a semi-supervised kernel matching method to address domain adaptation problems where the source distribution substantially differs from the target distri...
Min Xiao, Yuhong Guo