Sciweavers

980 search results - page 54 / 196
» On Negative Bases
Sort
View
ICDM
2009
IEEE
137views Data Mining» more  ICDM 2009»
14 years 3 months ago
Set-Based Boosting for Instance-Level Transfer
—The success of transfer to improve learning on a target task is highly dependent on the selected source data. Instance-based transfer methods reuse data from the source tasks to...
Eric Eaton, Marie desJardins
IEEEIAS
2009
IEEE
14 years 3 months ago
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation
: This paper proposes a new watermarking method for detecting image tampering. First, an authentication number is created using a pair of watermark pixels as the coefficients of a ...
Chin-Feng Lee, Kuo-Nan Chen, Chin-Chen Chang, Meng...
CALCO
2009
Springer
169views Mathematics» more  CALCO 2009»
14 years 3 months ago
Correctness, Completeness and Termination of Pattern-Based Model-to-Model Transformation
Abstract. Model-to-model (M2M) transformation consists in transforming models from a source to a target language. Many transformation languages exist, but few of them combine a dec...
Fernando Orejas, Esther Guerra, Juan de Lara, Hart...
ICIAR
2007
Springer
14 years 3 months ago
Image Retrieval Using Transaction-Based and SVM-Based Learning in Relevance Feedback Sessions
This paper introduces a composite relevance feedback approach for image retrieval using transaction-based and SVM-based learning. A transaction repository is dynamically constructe...
Xiaojun Qi, Ran Chang
DSN
2006
IEEE
14 years 3 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh