Sciweavers

780 search results - page 108 / 156
» Learning Mid-Level Features For Recognition
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
USS
2010
13 years 5 months ago
Acoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
Michael Backes, Markus Dürmuth, Sebastian Ger...
ICML
2010
IEEE
13 years 8 months ago
COFFIN: A Computational Framework for Linear SVMs
In a variety of applications, kernel machines such as Support Vector Machines (SVMs) have been used with great success often delivering stateof-the-art results. Using the kernel t...
Sören Sonnenburg, Vojtech Franc
RAS
2007
132views more  RAS 2007»
13 years 7 months ago
Virtual sensors for human concepts - Building detection by an outdoor mobile robot
Abstract— In human-robot communication it is often important to relate robot sensor readings to concepts used by humans. We suggest to use a virtual sensor (one or several physic...
Martin Persson, Tom Duckett, Achim J. Lilienthal
TASE
2008
IEEE
13 years 7 months ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du