Sciweavers

512 search results - page 27 / 103
» Closed-loop Robust Identification Using the Direct Approach
Sort
View
DSN
2003
IEEE
14 years 26 days ago
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet Services
Abstract: We present a new approach that uses compilerdirected fault-injection for coverage testing of recovery code in Internet services to evaluate their robustness to operating ...
Chen Fu, Richard P. Martin, Kiran Nagaraja, Thu D....
ICIP
2006
IEEE
14 years 9 months ago
Kalman Filtering for Pose-Invariant Face Recognition
We propose a novel algorithm for the identification of faces from image samples. The algorithm uses the Kalman filter to identify significant facial traits. Kalmanfaces are compac...
Horst Eidenberger
ICPR
2008
IEEE
14 years 8 months ago
Extraction of shoe-print patterns from impression evidence using Conditional Random Fields
Impression evidence in the form of shoe-prints are commonly found in crime scenes. A critical step in automatic shoe-print identification is extraction of the shoe-print pattern. ...
Sargur N. Srihari, Veshnu Ramakrishnan
BMCBI
2007
133views more  BMCBI 2007»
13 years 7 months ago
Semi-supervised learning for the identification of syn-expressed genes from fused microarray and in situ image data
Background: Gene expression measurements during the development of the fly Drosophila melanogaster are routinely used to find functional modules of temporally co-expressed genes. ...
Ivan G. Costa, Roland Krause, Lennart Opitz, Alexa...
AAAI
2006
13 years 9 months ago
Robust Support Vector Machine Training via Convex Outlier Ablation
One of the well known risks of large margin training methods, such as boosting and support vector machines (SVMs), is their sensitivity to outliers. These risks are normally mitig...
Linli Xu, Koby Crammer, Dale Schuurmans