Sciweavers

270 search results - page 46 / 54
» Use of Ensemble Based on GA for Imbalance Problem
Sort
View
ICPR
2002
IEEE
14 years 2 months ago
Parzen-Window Network Intrusion Detectors
Network intrusion detection is the problem of detecting anomalous network connections caused by intrusive activities. Many intrusion detection systems proposed before use both nor...
Dit-Yan Yeung, Calvin Chow
WIAMIS
2009
IEEE
14 years 3 months ago
Comparative evaluation of spatial context techniques for semantic image analysis
In this paper, two approaches to utilizing contextual information in semantic image analysis are presented and comparatively evaluated. Both approaches make use of spatial context...
Georgios Th. Papadopoulos, Carsten Saathoff, Marci...
CVPR
2008
IEEE
14 years 11 months ago
Discriminative local binary patterns for human detection in personal album
In recent years, local pattern based object detection and recognition have attracted increasing interest in computer vision research community. However, to our best knowledge no p...
Yadong Mu, Shuicheng Yan, Yi Liu, Thomas S. Huang,...
MMNS
2004
167views Multimedia» more  MMNS 2004»
13 years 10 months ago
Bandwidth Constrained IP Multicast Traffic Engineering Without MPLS Overlay
Existing multicast traffic engineering (TE) solutions tend to use explicit routing through MPLS tunnels. In this paper we shift away from this overlay approach and address the band...
Ning Wang, George Pavlou
CORR
2008
Springer
142views Education» more  CORR 2008»
13 years 9 months ago
A Gaussian Belief Propagation Solver for Large Scale Support Vector Machines
Support vector machines (SVMs) are an extremely successful type of classification and regression algorithms. Building an SVM entails solving a constrained convex quadratic program...
Danny Bickson, Elad Yom-Tov, Danny Dolev