Sciweavers

1216 search results - page 133 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
SSS
2007
Springer
130views Control Systems» more  SSS 2007»
14 years 2 months ago
Decentralized Detector Generation in Cooperative Intrusion Detection Systems
We consider Cooperative Intrusion Detection System (CIDS) which is a distributed AIS-based (Artificial Immune System) IDS where nodes collaborate over a peer-to-peer overlay netwo...
Rainer Bye, Katja Luther, Seyit Ahmet Çamte...
CVPR
2011
IEEE
13 years 4 months ago
Cross-View Action Recognition via View Knowledge Transfer
In this paper, we present a novel approach to recognizing human actions from different views by view knowledge transfer. An action is originally modelled as a bag of visual-words ...
Jingen Liu
ATAL
2006
Springer
13 years 11 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau
JMLR
2008
168views more  JMLR 2008»
13 years 8 months ago
Max-margin Classification of Data with Absent Features
We consider the problem of learning classifiers in structured domains, where some objects have a subset of features that are inherently absent due to complex relationships between...
Gal Chechik, Geremy Heitz, Gal Elidan, Pieter Abbe...
ICMCS
2005
IEEE
151views Multimedia» more  ICMCS 2005»
14 years 1 months ago
Face and Eye Rectification in Video Conference Using Artificial Neural Network
The lack of eye contact in video conference degrades the user’s experience. This problem has been known and studied for many years. There are hardware-based solutions to the eye...
Ben Yip