Sciweavers

1805 search results - page 106 / 361
» Computationally Efficient Face Detection
Sort
View
132
Voted
IDEAL
2010
Springer
15 years 2 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
142
Voted
ICPR
2000
IEEE
15 years 8 months ago
Eye Activity Detection and Recognition Using Morphological Scale-Space Decomposition
Automatic recovery of eye gestures from image sequences is one of the important topics for face recognition and model-based coding of videophone sequences. Usually complicated mod...
Ilse Ravyse, Hichem Sahli, Jan Cornelis, Marcel J....
102
Voted
TSMC
2008
127views more  TSMC 2008»
15 years 3 months ago
Sensor Placement for Fault Diagnosis
An algorithm is developed for computing which sensors to add to obtain maximum fault detectability and fault isolability. The method is based on only the structural information in...
Mattias Krysander, Erik Frisk
169
Voted
ATAL
2008
Springer
15 years 5 months ago
Playing games for security: an efficient exact algorithm for solving Bayesian Stackelberg games
In a class of games known as Stackelberg games, one agent (the leader) must commit to a strategy that can be observed by the other agent (the follower or adversary) before the adv...
Praveen Paruchuri, Jonathan P. Pearce, Janusz Mare...
117
Voted
ICPR
2004
IEEE
16 years 4 months ago
Inter-Stage Feature Propagation in Cascade Building with AdaBoost
A modification of the cascaded detector with the AdaBoost trained stage classifiers is proposed and brought to bear on the face detection problem. The cascaded detector is a seque...
Jan Sochman, Jiri Matas