Sciweavers

3135 search results - page 624 / 627
» Feature Extraction Using ICA
Sort
View
157
Voted
DAGM
2003
Springer
15 years 7 months ago
A Computational Model of Early Auditory-Visual Integration
We introduce a computational model of sensor fusion based on the topographic representations of a ”two-microphone and one camera” configuration. Our aim is to perform a robust...
Carsten Schauer, Horst-Michael Gross
ACSAC
2003
IEEE
15 years 5 months ago
Bayesian Event Classification for Intrusion Detection
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
Christopher Krügel, Darren Mutz, William K. R...
CIKM
2008
Springer
15 years 4 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
AAAI
2004
15 years 3 months ago
Text Classification by Labeling Words
Traditionally, text classifiers are built from labeled training examples. Labeling is usually done manually by human experts (or the users), which is a labor intensive and time co...
Bing Liu, Xiaoli Li, Wee Sun Lee, Philip S. Yu
ALMOB
2007
74views more  ALMOB 2007»
15 years 2 months ago
Evaluating deterministic motif significance measures in protein databases
Background: Assessing the outcome of motif mining algorithms is an essential task, as the number of reported motifs can be very large. Significance measures play a central role in...
Pedro Gabriel Ferreira, Paulo J. Azevedo