Sciweavers

172 search results - page 10 / 35
» Concept detectors: how good is good enough
Sort
View
CCS
2008
ACM
13 years 9 months ago
Principled reasoning and practical applications of alert fusion in intrusion detection systems
It is generally believed that by combining several diverse intrusion detectors (i.e., forming an IDS ensemble), we may achieve better performance. However, there has been very lit...
Guofei Gu, Alvaro A. Cárdenas, Wenke Lee
CSL
2006
Springer
13 years 7 months ago
Application-independent evaluation of speaker detection
We propose and motivate an alternative to the traditional error-based or cost-based evaluation metrics for the goodness of speaker detection performance. The metric that we propos...
Niko Brümmer, Johan A. du Preez
IAT
2010
IEEE
13 years 5 months ago
A Voting-Based Agent System for Course Selection in E-Learning
Agent technology is a good approach for solving a number of problems concerned with personalized learning. In personal learning contexts individual students are given an environme...
Ali M. Aseere, Enrico H. Gerding, David E. Millard
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
14 years 1 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
SIGOPSE
1990
ACM
13 years 11 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...