Sciweavers

65 search results - page 13 / 13
» Multiple Classifier Systems under Attack
Sort
View
NDSS
2007
IEEE
14 years 1 months ago
Attribute-Based Publishing with Hidden Credentials and Hidden Policies
With Hidden Credentials Alice can send policyencrypted data to Bob in such a way that he can decrypt the data only with the right combination of credentials. Alice gains no knowle...
Apu Kapadia, Patrick P. Tsang, Sean W. Smith
CVPR
2005
IEEE
14 years 9 months ago
A Two Level Approach for Scene Recognition
Classifying pictures into one of several semantic categories is a classical image understanding problem. In this paper, we present a stratified approach to both binary (outdoor-in...
Le Lu, Kentaro Toyama, Gregory D. Hager
ATAL
2010
Springer
13 years 7 months ago
Inter-robot transfer learning for perceptual classification
We introduce the novel problem of inter-robot transfer learning for perceptual classification of objects, where multiple heterogeneous robots communicate and transfer learned obje...
Zsolt Kira
WWW
2003
ACM
14 years 8 months ago
Design, implementation, and evaluation of a client characterization driven web server
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...
VLDB
2005
ACM
140views Database» more  VLDB 2005»
14 years 28 days ago
Loadstar: Load Shedding in Data Stream Mining
In this demo, we show that intelligent load shedding is essential in achieving optimum results in mining data streams under various resource constraints. The Loadstar system intro...
Yun Chi, Haixun Wang, Philip S. Yu