Sciweavers

2125 search results - page 327 / 425
» Points with Type-2 Operations
Sort
View
PAMI
2008
162views more  PAMI 2008»
13 years 9 months ago
Nonchronological Video Synopsis and Indexing
The amount of captured video is growing with the increased numbers of video cameras, especially the increase of millions of surveillance cameras that operate 24 hours/day. Since vi...
Yael Pritch, Alex Rav-Acha, Shmuel Peleg
PR
2006
114views more  PR 2006»
13 years 9 months ago
Orientation feature for fingerprint matching
This paper describes a fingerprint verification algorithm based on the orientation field. The orientation field of a fingerprint image has also been used for image alignment. Area...
Jayant V. Kulkarni, Bhushan D. Patil, Raghunath S....
SIAMJO
2008
86views more  SIAMJO 2008»
13 years 9 months ago
On the Second-Order Feasibility Cone: Primal-Dual Representation and Efficient Projection
We study the second-order feasibility cone F = {y IRn : My gT y} for given data (M, g). We construct a new representation for this cone and its dual based on the spectral decompo...
Alexandre Belloni, Robert M. Freund
SIGKDD
2008
150views more  SIGKDD 2008»
13 years 9 months ago
Learning to improve area-under-FROC for imbalanced medical data classification using an ensemble method
This paper presents our solution for KDD Cup 2008 competition that aims at optimizing the area under ROC for breast cancer detection. We exploited weighted-based classification me...
Hung-Yi Lo, Chun-Min Chang, Tsung-Hsien Chiang, Ch...
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
13 years 9 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...