Sciweavers

89 search results - page 16 / 18
» Wildfire detection using LMS based active learning
Sort
View
IMC
2009
ACM
14 years 1 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICMCS
2009
IEEE
153views Multimedia» more  ICMCS 2009»
13 years 5 months ago
Audio-visual privacy protection for video conference
Group video-conferencing systems are routinely used in major corporations, hospitals and universities for meetings, tele-medicine and distance learning among participants from very...
M. Vijay Venkatesh, Jian Zhao, L. Profitt, Sen-Chi...
WISE
2006
Springer
14 years 1 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...

Publication
173views
12 years 6 months ago
Max-Flow Segmentation of the Left Ventricle by Recovering Subject-Specific Distributions via a Bound of the Bhattacharyya Measur
This study investigates fast detection of the left ventricle (LV) endo- and epicardium boundaries in a cardiac magnetic resonance (MR) sequence following the optimization of two or...
Ismail Ben Ayed, Hua-mei Chen, Kumaradevan Punitha...
BMCBI
2008
97views more  BMCBI 2008»
13 years 7 months ago
SiteSeek: Post-translational modification analysis using adaptive locality-effective kernel methods and new profiles
Background: Post-translational modifications have a substantial influence on the structure and functions of protein. Post-translational phosphorylation is one of the most common m...
Paul D. Yoo, Yung Shwen Ho, Bing Bing Zhou, Albert...