Sciweavers

8381 search results - page 1649 / 1677
» The security of machine learning
Sort
View
ATAL
2010
Springer
13 years 7 months ago
Evaluating models of speaker head nods for virtual agents
Virtual human research has often modeled nonverbal behaviors based on the findings of psychological research. In recent years, however, there have been growing efforts to use auto...
Jina Lee, Zhiyang Wang, Stacy Marsella
ICC
2007
IEEE
128views Communications» more  ICC 2007»
13 years 7 months ago
The Power of Temporal Pattern Processing in Anomaly Intrusion Detection
Abstract— A clear deficiency in most of todays Anomaly Intrusion Detection Systems (AIDS) is their inability to distinguish between a new form of legitimate normal behavior and ...
Mohammad Al-Subaie, Mohammad Zulkernine

Publication
353views
13 years 8 months ago
Online Multi-Person Tracking-by-Detection from a Single, Uncalibrated Camera
In this paper, we address the problem of automatically detecting and tracking a variable number of persons in complex scenes using a monocular, potentially moving, uncalibrated ca...
Michael D. Breitenstein, Fabian Reichlin, Bastian ...
AI
2010
Springer
13 years 7 months ago
Understanding the scalability of Bayesian network inference using clique tree growth curves
Bayesian networks (BNs) are used to represent and ef ciently compute with multi-variate probability distributions in a wide range of disciplines. One of the main approaches to per...
Ole J. Mengshoel
BIOINFORMATICS
2007
151views more  BIOINFORMATICS 2007»
13 years 7 months ago
A new protein-protein docking scoring function based on interface residue properties
Motivation: Protein–protein complexes are known to play key roles in many cellular processes. However, they are often not accessible to experimental study because of their low s...
Julie Bernauer, Jérôme Azé, Jo...
« Prev « First page 1649 / 1677 Last » Next »