Sciweavers

SIGMOD
2006
ACM
116views Database» more  SIGMOD 2006»
14 years 9 months ago
Approximately detecting duplicates for streaming data using stable bloom filters
Traditional duplicate elimination techniques are not applicable to many data stream applications. In general, precisely eliminating duplicates in an unbounded data stream is not f...
Fan Deng, Davood Rafiei
WWW
2009
ACM
14 years 10 months ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
ISBI
2004
IEEE
14 years 10 months ago
Controling The False Positive Detection Rate In Fuzzy Clustering of fMRI Data
Despite its potential advantages for fMRI analysis, fuzzy C-means (FCM) clustering suffers from limitations such as the need for a priori knowledge of the number of clusters, and ...
Hesamoddin Jahanian, Hamid Soltanian-Zadeh, Gholam...
SIGSOFT
2006
ACM
14 years 10 months ago
How is aliasing used in systems software?
We present a study of all sources of aliasing in over one million lines of C code, identifying in the process the common patterns of aliasing that arise in practice. We find that ...
Brian Hackett, Alex Aiken
ICIP
2001
IEEE
14 years 11 months ago
Face detection from cluttered images using a polynomial neural network
In this paper, we propose a new method for face detection from cluttered images. We use a polynomial neural network (PNN) for separation of face and non-face patterns while the co...
Lin-Lin Huang, Akinobu Shimizu, Yoshihiro Hagihara...
ICIP
2004
IEEE
14 years 11 months ago
Identification of insect damaged wheat kernels using transmittance images
We used transmittance images and different learning algorithms to classify insect damaged and un-damaged wheat kernels. Using the histogram of the pixels of the wheat images as th...
A. Enis Çetin, Tom Pearson, Zehra Cataltepe
CVPR
2007
IEEE
14 years 11 months ago
Parameter Sensitive Detectors
Object detection can be challenging when the object class exhibits large variations. One commonly-used strategy is to first partition the space of possible object variations and t...
Quan Yuan, Ashwin Thangali, Vitaly Ablavsky, Stan ...
CVPR
2005
IEEE
14 years 11 months ago
Robust Object Detection via Soft Cascade
We describe a method for training object detectors using a generalization of the cascade architecture, which results in a detection rate and speed comparable to that of the best p...
Lubomir D. Bourdev, Jonathan Brandt