Sciweavers

259 search results - page 34 / 52
» Reinforcement Learning with the Use of Costly Features
Sort
View
ISBI
2007
IEEE
14 years 3 months ago
Multi-Resolution Image Segmentation Using the 2-Point Correlation Functions
Recently, the 2-point correlation functions (2-pcfs) were employed in building feature vectors for histological image segmentation. The 2-pcfs serve as estimators of material dist...
Firdaus Janoos, M. Okan Irfanoglu, Kishore Mosalig...
ICCV
2011
IEEE
12 years 9 months ago
Learning a Category Independent Object Detection Cascade
Cascades are a popular framework to speed up object detection systems. Here we focus on the first layers of a category independent object detection cascade in which we sample a l...
Esa Rahtu, Juho Kannala, Matthew Blaschko
PERCOM
2005
ACM
14 years 8 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
RAID
2000
Springer
14 years 20 days ago
Adaptive, Model-Based Monitoring for Cyber Attack Detection
Inference methods for detecting attacks on information resources typically use signature analysis or statistical anomaly detection methods. The former have the advantage of attack...
Alfonso Valdes, Keith Skinner
PR
2007
205views more  PR 2007»
13 years 8 months ago
Active learning for image retrieval with Co-SVM
In relevance feedback algorithms, selective sampling is often used to reduce the cost of labeling and explore the unlabeled data. In this paper, we proposed an active learning alg...
Jian Cheng, Kongqiao Wang