Sciweavers

2037 search results - page 329 / 408
» Chunking with Support Vector Machines
Sort
View
ICIAP
2003
ACM
14 years 2 months ago
PCA vs low resolution images in face verification
Principal Components Analysis (PCA) has been one of the most applied methods for face verification using only 2D information, in fact, PCA is practically the method of choice for ...
Cristina Conde, Antonio Ruiz, Enrique Cabello
FGR
2002
IEEE
155views Biometrics» more  FGR 2002»
14 years 2 months ago
Model-Based Face Tracking for View-Independent Facial Expression Recognition
Facial expression recognition is necessary for designing any realistic human-machine interfaces. Previous published facial expression recognition systems achieve good recognition ...
Salih Burak Göktürk, Carlo Tomasi, Bernd...
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...
ITS
2010
Springer
148views Multimedia» more  ITS 2010»
14 years 1 months ago
The Impact of System Feedback on Learners' Affective and Physiological States
We investigate how positive, neutral and negative feedback responses from an Intelligent Tutoring System (ITS) influences learners‟ affect and physiology. AutoTutor, an ITS with ...
Payam Aghaei Pour, M. Sazzad Hussain, Omar AlZoubi...
HAIS
2009
Springer
14 years 1 months ago
Pareto-Based Multi-output Model Type Selection
In engineering design the use of approximation models (= surrogate models) has become standard practice for design space exploration, sensitivity analysis, visualization and optimi...
Dirk Gorissen, Ivo Couckuyt, Karel Crombecq, Tom D...