Login / Signup
A Threat Assessment Method Based on Hierarchies and Modules.
Fang Deng
Xinan Liu
Zhihong Peng
Jie Chen
Published in:
J. Adv. Comput. Intell. Intell. Informatics (2014)
Keyphrases
</>
computational cost
objective function
detection method
evaluation method
high precision
mathematical model
computationally efficient
mutual information
optimization method
fully automatic
main contribution
computer vision
probabilistic model
dynamic programming
preprocessing
similarity measure
feature selection