Sciweavers

3204 search results - page 162 / 641
» Online Learning with Constraints
Sort
View
IAT
2007
IEEE
14 years 4 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
ICPR
2008
IEEE
14 years 4 months ago
Video object segmentation based on graph cut with dynamic shape prior constraint
In this work, we present a novel segmentation method for deformable objects in monocular videos. Firstly we introduce the dynamic shape to represent the prior knowledge about obje...
Peng Tang, Lin Gao
ACE
2004
315views Education» more  ACE 2004»
13 years 11 months ago
Applying SPICE to e-Learning: An e-Learning Maturity Model?
The Capability Maturity Model and SPICE approach to software process improvement has resulted in a robust system for improving development process capability in the field of softw...
Stephen Marshall, Geoff Mitchell
ICML
2003
IEEE
14 years 11 months ago
Using Linear-threshold Algorithms to Combine Multi-class Sub-experts
We present a new type of multi-class learning algorithm called a linear-max algorithm. Linearmax algorithms learn with a special type of attribute called a sub-expert. A sub-exper...
Chris Mesterharm
ECCV
2008
Springer
15 years 8 days ago
Online Tracking and Reacquisition Using Co-trained Generative and Discriminative Trackers
Visual tracking is a challenging problem, as an object may change its appearance due to viewpoint variations, illumination changes, and occlusion. Also, an object may leave the fie...
Gérard G. Medioni, Qian Yu, Thang Ba Dinh