Sciweavers

512 search results - page 9 / 103
» Closed-loop Robust Identification Using the Direct Approach
Sort
View
JCP
2008
190views more  JCP 2008»
13 years 7 months ago
Real-time System Identification of Unmanned Aerial Vehicles: A Multi-Network Approach
In this paper, real-time system identification of an unmanned aerial vehicle (UAV) based on multiple neural networks is presented. The UAV is a multi-input multi-output (MIMO) nonl...
Vishwas R. Puttige, Sreenatha G. Anavatti
ASE
1999
90views more  ASE 1999»
13 years 7 months ago
A Concept Formation Based Approach to Object Identification in Procedural Code
Legacy software systems present a high level of entropy combined with imprecise documentation. This makes their maintenance more difficult, more time consuming, and costlier. In or...
Houari A. Sahraoui, Hakim Lounis, Walcélio ...
KDD
1998
ACM
181views Data Mining» more  KDD 1998»
13 years 11 months ago
Approaches to Online Learning and Concept Drift for User Identification in Computer Security
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
Terran Lane, Carla E. Brodley
CEAS
2007
Springer
14 years 1 months ago
A Discriminative Classifier Learning Approach to Image Modeling and Spam Image Identification
We propose a discriminative classifier learning approach to image modeling for spam image identification. We analyze a large number of images extracted from the SpamArchive spam c...
Byungki Byun, Chin-Hui Lee, Steve Webb, Calton Pu
CAIP
2009
Springer
156views Image Analysis» more  CAIP 2009»
14 years 2 months ago
Bio-inspired Approach for the Recognition of Goal-Directed Hand Actions
The recognition of transitive, goal-directed actions requires a sensible balance between the representation of specific shape details of effector and goal object and robustness w...
Falk Fleischer, Antonino Casile, Martin A. Giese