Sciweavers

212 search results - page 37 / 43
» Embedded Unsupervised Feature Selection
Sort
View
RAID
2001
Springer
14 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson
TIFS
2010
140views more  TIFS 2010»
13 years 4 months ago
An Evaluation of Video-to-Video Face Verification
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedd...
Norman Poh, Chi-Ho Chan, Josef Kittler, Séb...
TCBB
2010
108views more  TCBB 2010»
13 years 4 months ago
Identification of Full and Partial Class Relevant Genes
Multiclass cancer classification on microarray data has provided the feasibility of cancer diagnosis across all of the common malignancies in parallel. Using multiclass cancer feat...
Zexuan Zhu, Yew-Soon Ong, Jacek M. Zurada
DATE
2007
IEEE
95views Hardware» more  DATE 2007»
14 years 4 months ago
Memory bank aware dynamic loop scheduling
In a parallel system with multiple CPUs, one of the key problems is to assign loop iterations to processors. This problem, known as the loop scheduling problem, has been studied i...
Mahmut T. Kandemir, Taylan Yemliha, Seung Woo Son,...
CVPR
2008
IEEE
14 years 12 months ago
Discriminative learning of visual words for 3D human pose estimation
This paper addresses the problem of recovering 3D human pose from a single monocular image, using a discriminative bag-of-words approach. In previous work, the visual words are le...
Huazhong Ning, Wei Xu, Yihong Gong, Thomas S. Huan...