Sciweavers

318 search results - page 33 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ICPR
2010
IEEE
14 years 9 months ago
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT
The quality of the lung nodule models determines the success of lung nodule detection. This paper describes aspects of our data-driven approach for modeling lung nodules using the...
Amal Farag, James Graham, Aly A. Farag
ICMI
2009
Springer
150views Biometrics» more  ICMI 2009»
15 years 4 months ago
Agreement detection in multiparty conversation
This paper presents a system for the automatic detection of agreements in multi-party conversations. We investigate various types of features that are useful for identifying agree...
Sebastian Germesin, Theresa Wilson
100
Voted
ICMCS
2008
IEEE
330views Multimedia» more  ICMCS 2008»
15 years 4 months ago
Automatic trademark detection and recognition in sport videos
In this paper we describe a system for automatic detection and recognition of trademarks in sports videos. We propose a compact representation of trademarks based on SIFT feature ...
Lamberto Ballan, Marco Bertini, Alberto Del Bimbo,...
IDEAL
2010
Springer
14 years 8 months ago
Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
Carsten Elfers, Mirko Horstmann, Karsten Sohr, Ott...
ICDIM
2010
IEEE
14 years 7 months ago
Detecting incompleteness in access control policies using data classification schemes
In a set of access control policies, incompleteness is the existence of situations for which no policy applies. Some of these situations can be exploited by attackers, to obtain un...
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo, Serg...