Sciweavers

3556 search results - page 134 / 712
» Can machine learning be secure
Sort
View
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
14 years 3 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
ICARIS
2005
Springer
14 years 3 months ago
Immunising Automated Teller Machines
Abstract. This paper presents an immune-inspired adaptable error detection (AED) framework for Automated Teller Machines (ATMs). This framework two levels, one level is local to a ...
Modupe Ayara, Jon Timmis, Rogério de Lemos,...
MLMI
2004
Springer
14 years 3 months ago
Emotion Analysis in Man-Machine Interaction Systems
Facial expression and hand gesture analysis plays a fundamental part in emotionally rich man-machine interaction (MMI) systems, since it employs universally accepted non-verbal cu...
T. Balomenos, Amaryllis Raouzaiou, Spiros Ioannou,...
KDD
2005
ACM
168views Data Mining» more  KDD 2005»
14 years 10 months ago
Nomograms for visualizing support vector machines
We propose a simple yet potentially very effective way of visualizing trained support vector machines. Nomograms are an established model visualization technique that can graphica...
Aleks Jakulin, Martin Mozina, Janez Demsar, Ivan B...
CVPR
2012
IEEE
12 years 25 days ago
The Shape Boltzmann Machine: A strong model of object shape
A good model of object shape is essential in applications such as segmentation, object detection, inpainting and graphics. For example, when performing segmentation, local constra...
S. M. Ali Eslami, Nicolas Heess, John M. Winn