Sciweavers

988 search results - page 195 / 198
» Intrusion Detection with Neural Networks
Sort
View
ICDAR
1999
IEEE
14 years 5 days ago
Multifont Classification using Typographical Attributes
This paper introduces a multifont classification scheme to help recognition of multifont and multisize characters. It uses typographical attributes such as ascenders, descenders a...
Min-Chul Jung, Yong-Chul Shin, Sargur N. Srihari
CVPR
2008
IEEE
13 years 9 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
13 years 9 months ago
Towards memoryless model building
Probabilistic model building methods can render difficult problems feasible by identifying and exploiting dependencies. They build a probabilistic model from the statistical prope...
David Iclanzan, Dumitru Dumitrescu
HIPC
2009
Springer
13 years 5 months ago
Optimizing the use of GPU memory in applications with large data sets
Abstract--With General Purpose programmable GPUs becoming more and more popular, automated tools are needed to bridge the gap between achievable performance from highly parallel ar...
Nadathur Satish, Narayanan Sundaram, Kurt Keutzer
JCNS
2010
100views more  JCNS 2010»
13 years 2 months ago
Methods for predicting cortical UP and DOWN states from the phase of deep layer local field potentials
During anesthesia, slow-wave sleep and quiet wakefulness, neuronal membrane potentials collectively switch between de- and hyperpolarized levels, the cortical UP and DOWN states. P...
Aman B. Saleem, Paul Chadderton, John Apergis-Scho...