Sciweavers

2438 search results - page 407 / 488
» Incremental Learning in Biological and Machine Learning Syst...
Sort
View
139
Voted
CCS
2007
ACM
15 years 10 months ago
Network anomaly detection based on TCM-KNN algorithm
Intrusion detection is a critical component of secure information systems. Network anomaly detection has been an active and difficult research topic in the field of Intrusion Dete...
Yang Li, Binxing Fang, Li Guo, You Chen
166
Voted
CVPR
2009
IEEE
1096views Computer Vision» more  CVPR 2009»
16 years 10 months ago
How far can you get with a modern face recognition test set using only simple features?
In recent years, large databases of natural images have become increasingly popular in the evaluation of face and object recognition algorithms. However, Pinto et al. previously ...
Nicolas Pinto, James J. DiCarlo, David D. Cox
IUI
2009
ACM
16 years 25 days ago
Detecting and correcting user activity switches: algorithms and interfaces
The TaskTracer system allows knowledge workers to define a set of activities that characterize their desktop work. It then associates with each user-defined activity the set of ...
Jianqiang Shen, Jed Irvine, Xinlong Bao, Michael G...
ECTEL
2007
Springer
15 years 10 months ago
An Interoperability Infrastructure for Distributed Feed Networks
Blogs have the aordance to become an integral part of teaching and learning processes as a vehicle for knowledge management. Open, exible systems integrating blogs provide user-f...
Fridolin Wild, Steinn E. Sigurðarson, Stefan S...
ESWA
2007
136views more  ESWA 2007»
15 years 3 months ago
Semantic-based facial expression recognition using analytical hierarchy process
In this paper we present an automatic facial expression recognition system that utilizes a semantic-based learning algorithm using the analytical hierarchy process (AHP). Although...
Shyi-Chyi Cheng, Ming-Yao Chen, Hong-Yi Chang, Tzu...