Sciweavers

4897 search results - page 931 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
ESWS
2007
Springer
15 years 3 months ago
Towards Semantic Social Networks
Abstract. Computer manipulated social networks are usually built from the explicit assertion by users that they have some relation with other users or by the implicit evidence of s...
Jason J. Jung, Jérôme Euzenat
DAGM
2006
Springer
15 years 3 months ago
Exploiting Low-Level Image Segmentation for Object Recognition
Abstract. A method for exploiting the information in low-level image segmentations for the purpose of object recognition is presented. The key idea is to use a whole ensemble of se...
Volker Roth, Björn Ommer
AVBPA
2003
Springer
135views Biometrics» more  AVBPA 2003»
15 years 3 months ago
Comparison of MLP and GMM Classifiers for Face Verification on XM2VTS
We compare two classifier approaches, namely classifiers based on Multi Layer Perceptrons (MLPs) and Gaussian Mixture Models (GMMs), for use in a face verification system. The comp...
Fabien Cardinaux, Conrad Sanderson, Sébasti...
EUROGP
2008
Springer
15 years 1 months ago
PlasmidPL: A Plasmid-Inspired Language for Genetic Programming
We present PlasmidPL, a plasmid-inspired programming language designed for Genetic Programming (GP), and based on a chemical metaphor. The basic data structures in PlasmidPL are ci...
Lidia Yamamoto
DIMVA
2008
15 years 1 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...