Sciweavers

1663 search results - page 210 / 333
» Computer Security in the Real World
Sort
View
KDD
1999
ACM
199views Data Mining» more  KDD 1999»
15 years 8 months ago
The Application of AdaBoost for Distributed, Scalable and On-Line Learning
We propose to use AdaBoost to efficiently learn classifiers over very large and possibly distributed data sets that cannot fit into main memory, as well as on-line learning wher...
Wei Fan, Salvatore J. Stolfo, Junxin Zhang
SMILE
1998
Springer
15 years 8 months ago
Automatic 3D Model Construction for Turn-Table Sequences
As virtual worlds demand ever more realistic 3D models, attention is being focussed on systems that can acquire graphical models from real objects. This paper describes a system wh...
Andrew W. Fitzgibbon, Geoffrey Cross, Andrew Zisse...
AGP
1994
IEEE
15 years 8 months ago
What the Event Calculus actually does, and how to do it efficiently
Kowalski and Sergot's Event Calculus (EC) is a formalism for reasoning about time and change in a logic programming framework. From a description of events which occur in the...
Iliano Cervesato, Luca Chittaro, Angelo Montanari
ICPR
2010
IEEE
15 years 8 months ago
Human Pose Estimation for Multiple Persons Based on Volume Reconstruction
—Most of the development of pose recognition focused on a single person. However, many applications of computer vision essentially require the estimation of multiple people. Henc...
Xinghan Luo
CGI
2009
IEEE
15 years 8 months ago
Visual analytics of time dependent 2D point clouds
Two dimensional point data can be considered one of the most basic, yet one of the most ubiquitous data types arising in a wide variety of applications. The basic scatter plot app...
Tatiana von Landesberger, Sebastian Bremm, Peyman ...