Sciweavers

3556 search results - page 631 / 712
» Can machine learning be secure
Sort
View
ICMI
2009
Springer
198views Biometrics» more  ICMI 2009»
14 years 4 months ago
Detecting, tracking and interacting with people in a public space
We have built a system that engages naive users in an audiovisual interaction with a computer in an unconstrained public space. We combine audio source localization techniques wit...
Sunsern Cheamanunkul, Evan Ettinger, Matt Jacobsen...
INCDM
2009
Springer
131views Data Mining» more  INCDM 2009»
14 years 4 months ago
Computer-Aided Diagnosis in Brain Computed Tomography Screening
Currently, interpretation of medical images is almost exclusively made by specialized physicians. Although, the next decades will most certainly be of change and computer-aided dia...
Hugo Peixoto, Victor Alves
SCALESPACE
2009
Springer
14 years 4 months ago
Momentum Based Optimization Methods for Level Set Segmentation
Abstract. Segmentation of images is often posed as a variational problem. As such, it is solved by formulating an energy functional depending on a contour and other image derived t...
Gunnar Läthén, Thord Andersson, Reiner...
ICEIS
2008
IEEE
14 years 4 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya
ICPR
2008
IEEE
14 years 4 months ago
On second order operators and quadratic operators
In pattern recognition, computer vision, and image processing, many approaches are based on second order operators. Well-known examples are second order networks, the 3D structure...
Michael Felsberg