Sciweavers

298 search results - page 12 / 60
» Computer security: quality rather than quantity
Sort
View
ACCV
2006
Springer
14 years 1 months ago
Key Frame-Based Activity Representation Using Antieigenvalues
Many activities may be characterized by a sequence of key frames that are related to important changes in motion rather than dominant characteristics that persist over a long seque...
Naresh P. Cuntoor, Rama Chellappa
CVPR
2011
IEEE
13 years 7 months ago
Dynamic Batch Mode Active Learning
Active learning techniques have gained popularity in reducing human effort to annotate data instances for inducing a classifier. When faced with large quantities of unlabeled dat...
Shayok Chakraborty, Vineeth Balasubramanian, Sethu...
SIGCSE
2008
ACM
155views Education» more  SIGCSE 2008»
13 years 9 months ago
Towards a top-down approach to teaching an undergraduate grid computing course
Early undergraduate Grid computing courses generally took a bottom-up approach to Grid computing education starting with network protocols, client-server concepts, creating Web an...
Barry Wilkinson, Clayton Ferner
SDMW
2004
Springer
14 years 3 months ago
Experimental Analysis of Privacy-Preserving Statistics Computation
The recent investigation of privacy-preserving data mining and other kinds of privacy-preserving distributed computation has been motivated by the growing concern about the privacy...
Hiranmayee Subramaniam, Rebecca N. Wright, Zhiqian...
ICCBR
1995
Springer
14 years 1 months ago
On the use of CBR in optimisation problems such as the TSP
The particular strength of CBR is normally considered to be its use in weak theory domains where solution quality is compiled into cases and is reusable. In this paper we explore a...
Padraig Cunningham, Barry Smyth, Neil J. Hurley