Sciweavers

807 search results - page 157 / 162
» Learning with Probabilistic Features for Improved Pipeline M...
Sort
View
ECCV
2008
Springer
14 years 9 months ago
Simultaneous Visual Recognition of Manipulation Actions and Manipulated Objects
Abstract. The visual analysis of human manipulation actions is of interest for e.g. human-robot interaction applications where a robot learns how to perform a task by watching a hu...
Danica Kragic, David Martínez Mercado, Hedv...
CGO
2007
IEEE
14 years 1 months ago
Rapidly Selecting Good Compiler Optimizations using Performance Counters
Applying the right compiler optimizations to a particular program can have a significant impact on program performance. Due to the non-linear interaction of compiler optimization...
John Cavazos, Grigori Fursin, Felix V. Agakov, Edw...
ISPASS
2006
IEEE
14 years 1 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
AAAI
2007
13 years 9 months ago
Turning Lectures into Comic Books Using Linguistically Salient Gestures
Creating video recordings of events such as lectures or meetings is increasingly inexpensive and easy. However, reviewing the content of such video may be time-consuming and dif...
Jacob Eisenstein, Regina Barzilay, Randall Davis
CORR
2010
Springer
149views Education» more  CORR 2010»
13 years 7 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh