Sciweavers

345 search results - page 60 / 69
» Using Active Learning in Intrusion Detection
Sort
View
FAST
2004
14 years 12 months ago
Tracefs: A File System to Trace Them All
File system traces have been used for years to analyze user behavior and system software behavior, leading to advances in file system and storage technologies. Existing traces, ho...
Akshat Aranya, Charles P. Wright, Erez Zadok
CVPR
2008
IEEE
16 years 16 days ago
Parameterized Kernel Principal Component Analysis: Theory and applications to supervised and unsupervised image alignment
Parameterized Appearance Models (PAMs) (e.g. eigentracking, active appearance models, morphable models) use Principal Component Analysis (PCA) to model the shape and appearance of...
Fernando De la Torre, Minh Hoai Nguyen
MLMI
2007
Springer
15 years 4 months ago
Modeling Vocal Interaction for Segmentation in Meeting Recognition
Automatic segmentation is an important technology for both automatic speech recognition and automatic speech understanding. In meetings, participants typically vocalize for only a ...
Kornel Laskowski, Tanja Schultz
TRECVID
2008
14 years 12 months ago
LIG and LIRIS at TRECVID 2008: High Level Feature Extraction and Collaborative Annotation
This paper describes our participations of LIG and LIRIS to the TRECVID 2008 High Level Features detection task. We evaluated several fusion strategies and especially rank fusion....
CN
2010
183views more  CN 2010»
14 years 10 months ago
A learning automata based scheduling solution to the dynamic point coverage problem in wireless sensor networks
The dynamic point coverage problem in wireless sensor networks is to detect some moving target points in the area of the network using as little sensor nodes as possible. One way ...
Mehdi Esnaashari, Mohammad Reza Meybodi