Sciweavers

1404 search results - page 195 / 281
» Complexity of admissible rules
Sort
View
TSMC
2008
172views more  TSMC 2008»
13 years 8 months ago
AdaBoost-Based Algorithm for Network Intrusion Detection
Abstract--Network intrusion detection aims at distinguishing the attacks on the Internet from normal use of the Internet. It is an indispensable part of the information security sy...
Weiming Hu, Wei Hu, Stephen J. Maybank
ICRA
2010
IEEE
149views Robotics» more  ICRA 2010»
13 years 7 months ago
Towards simplicial coverage repair for mobile robot teams
— In this note, we present initial results towards developing a distributed algorithm for repairing topological holes in the sensor cover of a mobile robot team. Central to our a...
Jason C. Derenick, Vijay Kumar, Ali Jadbabaie
PAMI
2010
160views more  PAMI 2010»
13 years 7 months ago
Photometric Stereo via Expectation Maximization
—This paper presents a robust and automatic approach to photometric stereo, where the two main components, namely surface normals and visible surfaces, are respectively optimized...
Tai-Pang Wu, Chi-Keung Tang
TSD
2010
Springer
13 years 7 months ago
Diagnostics for Debugging Speech Recognition Systems
Modern speech recognition applications are becoming very complex program packages. To understand the error behaviour of the ASR systems, a special diagnosis - a procedure or a tool...
Milos Cernak
ACL
2010
13 years 6 months ago
Towards Relational POMDPs for Adaptive Dialogue Management
Open-ended spoken interactions are typically characterised by both structural complexity and high levels of uncertainty, making dialogue management in such settings a particularly...
Pierre Lison