Sciweavers

1020 search results - page 182 / 204
» Implementation of a Constraint-Based Visualization System
Sort
View
JUCS
2008
118views more  JUCS 2008»
13 years 9 months ago
Enhancements of Meeting Information Management and Application for Knowledge Access and Learning Activities
: Communication processes have become increasingly important in modern working life. Organizations invest a surprisingly high amount of financial resources and employee work time i...
Christian Gütl
CVPR
2004
IEEE
14 years 11 months ago
Learning Methods for Generic Object Recognition with Invariance to Pose and Lighting
We assess the applicability of several popular learning methods for the problem of recognizing generic visual categories with invariance to pose, lighting, and surrounding clutter...
Fu Jie Huang, Léon Bottou, Yann LeCun
KDD
2006
ACM
272views Data Mining» more  KDD 2006»
14 years 9 months ago
YALE: rapid prototyping for complex data mining tasks
KDD is a complex and demanding task. While a large number of methods has been established for numerous problems, many challenges remain to be solved. New tasks emerge requiring th...
Ingo Mierswa, Michael Wurst, Ralf Klinkenberg, Mar...
CRV
2009
IEEE
115views Robotics» more  CRV 2009»
14 years 3 months ago
Learning Model Complexity in an Online Environment
In this paper we introduce the concept and method for adaptively tuning the model complexity in an online manner as more examples become available. Challenging classification pro...
Dan Levi, Shimon Ullman
SOUPS
2005
ACM
14 years 2 months ago
The battle against phishing: Dynamic Security Skins
Phishing is a model problem for illustrating usability concerns of privacy and security because both system designers and attackers battle using user interfaces to guide (or misgu...
Rachna Dhamija, J. Doug Tygar