Sciweavers

592 search results - page 28 / 119
» Learning of personalized security settings
Sort
View
ICCV
2009
IEEE
15 years 1 months ago
Which Faces to Tag: Adding Prior Constraints into Active Learning
We introduce an algorithm that guides the user to tag faces in the best possible order during a face recognition assisted tagging scenario. In particular, we extend the active l...
Ashish Kapoor, Gang Hua, Amir Akbarzadeh and Simon...
ECRIME
2007
14 years 27 days ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
CVPR
2011
IEEE
13 years 21 days ago
Learning People Detection Models from Few Training Samples
People detection is an important task for a wide range of applications in computer vision. State-of-the-art methods learn appearance based models requiring tedious collection and ...
Leonid Pishchulin, Christian Wojek, Arjun Jain, Th...
AGENTS
1997
Springer
14 years 1 months ago
Learning View Graphs for Robot Navigation
Abstract. We present a purely vision-based scheme for learning a topological representation of an open environment. The system represents selected places by local views of the surr...
Matthias O. Franz, Bernhard Schölkopf, Philip...
ECTEL
2006
Springer
14 years 19 days ago
Finding Communities of Practice from User Profiles Based on Folksonomies
User profiles can be used to identify persons inside a community with similar interests. Folksonomy systems allow users to individually tag the objects of a common set (e.g., web p...
Jörg Diederich, Tereza Iofciu