Sciweavers

1176 search results - page 193 / 236
» Theory and Applications of Robust Optimization
Sort
View
TSMC
2002
134views more  TSMC 2002»
14 years 11 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
TIP
2008
185views more  TIP 2008»
14 years 11 months ago
Active Learning Methods for Interactive Image Retrieval
Active learning methods have been considered with increased interest in the statistical learning community. Initially developed within a classification framework, a lot of extensio...
Philippe Henri Gosselin, Matthieu Cord
ICRA
2010
IEEE
129views Robotics» more  ICRA 2010»
14 years 10 months ago
Improving mutual information-based visual servoing
— In a previous paper [3], we proposed a new way to achieve visual servoing. Rather than minimizing the error between the position of two set of geometric features, we proposed t...
Amaury Dame, Éric Marchand
TIP
2010
129views more  TIP 2010»
14 years 10 months ago
Selective Data Pruning-Based Compression Using High-Order Edge-Directed Interpolation
—This paper proposes a selective data pruning-based compression scheme to improve the rate-distortion relation of compressed images and video sequences. The original frames are p...
Dung Trung Vo, Joel Solé, Peng Yin, Cristin...
GLOBECOM
2010
IEEE
14 years 9 months ago
Cache-Based Scalable Deep Packet Inspection with Predictive Automaton
Abstract--Regular expression (Regex) becomes the standard signature language for security and application detection. Deterministic finite automata (DFAs) are widely used to perform...
Yi Tang, Junchen Jiang, Xiaofei Wang, Yi Wang, Bin...