Sciweavers

308 search results - page 42 / 62
» A Machine Learning Approach to Foreign Key Discovery
Sort
View
IJON
2008
186views more  IJON 2008»
13 years 7 months ago
Computational analysis and learning for a biologically motivated model of boundary detection
In this work we address the problem of boundary detection by combining ideas and approaches from biological and computational vision. Initially, we propose a simple and efficient ...
Iasonas Kokkinos, Rachid Deriche, Olivier D. Fauge...
ILP
2007
Springer
14 years 1 months ago
Structural Statistical Software Testing with Active Learning in a Graph
Structural Statistical Software Testing (SSST) exploits the control flow graph of the program being tested to construct test cases. Specifically, SSST exploits the feasible paths...
Nicolas Baskiotis, Michèle Sebag
IEEECIT
2010
IEEE
13 years 5 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
ICRA
2010
IEEE
164views Robotics» more  ICRA 2010»
13 years 5 months ago
Boundary detection based on supervised learning
— Detecting the boundaries of objects is a key step in separating foreground objects from the background, which is useful for robotics and computer vision applications, such as o...
Kiho Kwak, Daniel F. Huber, Jeongsook Chae, Takeo ...
ISM
2008
IEEE
140views Multimedia» more  ISM 2008»
14 years 1 months ago
Medical Video Event Classification Using Shared Features
Advances in video technology are being incorporated into today’s medical research and education. Medical videos contain important medical events, such as diagnostic or therapeut...
Yu Cao, Shih-Hsi Liu, Ming Li, Sung Baang, Sanqing...