Sciweavers

8381 search results - page 1594 / 1677
» The security of machine learning
Sort
View
125
Voted
CVPR
2007
IEEE
16 years 2 months ago
Beyond bottom-up: Incorporating task-dependent influences into a computational model of spatial attention
A critical function in both machine vision and biological vision systems is attentional selection of scene regions worthy of further analysis by higher-level processes such as obj...
Robert J. Peters, Laurent Itti
CVPR
2008
IEEE
16 years 2 months ago
Constrained spectral clustering through affinity propagation
Pairwise constraints specify whether or not two samples should be in one cluster. Although it has been successful to incorporate them into traditional clustering methods, such as ...
Miguel Á. Carreira-Perpiñán, ...
87
Voted
ICPR
2006
IEEE
16 years 1 months ago
Boosted Gabor Features Applied to Vehicle Detection
Robust vehicle detection is a challenging task given vehicles with different types, and sizes, and at different distances. This paper proposes a Boosted Gabor Features (BGF) appro...
Chong Sun, Hong Cheng, Nanning Zheng
123
Voted
MICCAI
2005
Springer
16 years 1 months ago
Exploiting Temporal Information in Functional Magnetic Resonance Imaging Brain Data
Functional Magnetic Resonance Imaging(fMRI) has enabled scientists to look into the active human brain, leading to a flood of new data, thus encouraging the development of new data...
Lei Zhang 0002, Dimitris Samaras, Dardo Tomasi, Ne...
109
Voted
WWW
2009
ACM
16 years 1 months ago
Automated construction of web accessibility models from transaction click-streams
Screen readers, the dominant assistive technology used by visually impaired people to access the Web, function by speaking out the content of the screen serially. Using screen rea...
Jalal Mahmud, Yevgen Borodin, I. V. Ramakrishnan, ...
« Prev « First page 1594 / 1677 Last » Next »