Sciweavers

7413 search results - page 1374 / 1483
» Using Specularities for Recognition
Sort
View
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
14 years 2 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
GECCO
2005
Springer
186views Optimization» more  GECCO 2005»
14 years 1 months ago
Subproblem optimization by gene correlation with singular value decomposition
Several ways of using singular value decomposition (SVD), a linear algebra technique typically used for information retrieval, to decompose problems into subproblems are investiga...
Jacob G. Martin
KDD
2009
ACM
262views Data Mining» more  KDD 2009»
14 years 8 months ago
Sentiment analysis of blogs by combining lexical knowledge with text classification
The explosion of user-generated content on the Web has led to new opportunities and significant challenges for companies, that are increasingly concerned about monitoring the disc...
Prem Melville, Wojciech Gryc, Richard D. Lawrence
FGR
2002
IEEE
197views Biometrics» more  FGR 2002»
14 years 1 months ago
Robust Full-Motion Recovery of Head by Dynamic Templates and Re-Registration Techniques
This paper presents a method to recover the full-motion (3 rotations and 3 translations) of the head from an input video using a cylindrical head model. Given an initial reference...
Jing Xiao, Takeo Kanade, Jeffrey F. Cohn
ICCV
1998
IEEE
14 years 9 days ago
Condensing Image Databases when Retrieval is Based on Non-Metric Distances
One of the key problems in appearance-based vision is understanding how to use a set of labeled images to classify new images. Classification systems that can model human performa...
David W. Jacobs, Daphna Weinshall, Yoram Gdalyahu
« Prev « First page 1374 / 1483 Last » Next »