Sciweavers

746 search results - page 121 / 150
» A general method for human activity recognition in video
Sort
View
CAV
2011
Springer
216views Hardware» more  CAV 2011»
12 years 11 months ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
IROS
2006
IEEE
142views Robotics» more  IROS 2006»
14 years 1 months ago
Experience Based Imitation Using RNNPB
—Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human whose phys...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...
AR
2007
99views more  AR 2007»
13 years 7 months ago
Experience-based imitation using RNNPB
Abstract— Robot imitation is a useful and promising alternative to robot programming. Robot imitation involves two crucial issues. The first is how a robot can imitate a human w...
Ryunosuke Yokoya, Tetsuya Ogata, Jun Tani, Kazunor...
ICMI
2007
Springer
160views Biometrics» more  ICMI 2007»
14 years 1 months ago
Using the influence model to recognize functional roles in meetings
In this paper, an influence model is used to recognize functional roles played during meetings. Previous works on the same corpus demonstrated a high recognition accuracy using SV...
Wen Dong, Bruno Lepri, Alessandro Cappelletti, Ale...
KDD
2004
ACM
124views Data Mining» more  KDD 2004»
14 years 1 months ago
Incorporating prior knowledge with weighted margin support vector machines
Like many purely data-driven machine learning methods, Support Vector Machine (SVM) classifiers are learned exclusively from the evidence presented in the training dataset; thus ...
Xiaoyun Wu, Rohini K. Srihari