Sciweavers

NSDI
2008
13 years 6 months ago
Behind Phishing: An Examination of Phisher Modi Operandi
Phishing costs Internet users billions of dollars a year. Using various data sets collected in real-time, this paper analyzes various aspects of phisher modi operandi. We examine ...
D. Kevin McGrath, Minaxi Gupta
ICPR
2008
IEEE
14 years 5 months ago
Efficient background modeling through incremental Support Vector Data Description
Background modeling is an essential and important part of many high-level video processing applications. Recently, the Support Vector Data Description (SVDD) has been introduced f...
Alireza Tavakkoli, Mircea Nicolescu, George Bebis,...
ICIP
2002
IEEE
14 years 6 months ago
An ICA algorithm for analyzing multiple data sets
In this paper we derive an independent-component analysis (ICA) method for analyzing two or more data sets simultaneously. Our model permits there to be components individual to t...
Ana S. Lukic, Lars Kai Hansen, Miles N. Wernick, S...