Sciweavers

318 search results - page 38 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
108
Voted
NAACL
2004
15 years 1 months ago
Multiple Similarity Measures and Source-Pair Information in Story Link Detection
State-of-the-art story link detection systems, that is, systems that determine whether two stories are about the same event or linked, are usually based on the cosine-similarity m...
Francine Chen, Ayman Farahat, Thorsten Brants
107
Voted
IAAI
2003
15 years 1 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
109
Voted
INFOCOM
2009
IEEE
15 years 7 months ago
ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks
—Dynamic spectrum access has been proposed as a means to share scarce radio resources, and requires devices to follow protocols that use resources in a proper, disciplined manner...
Song Liu, Yingying Chen, Wade Trappe, Larry J. Gre...
106
Voted
ACCV
2006
Springer
15 years 6 months ago
Boosted Algorithms for Visual Object Detection on Graphics Processing Units
Nowadays, the use of machine learning methods for visual object detection has become widespread. Those methods are robust. They require an important processing power and a high mem...
Hicham Ghorayeb, Bruno Steux, Claude Laurgeau
121
Voted
ICML
2000
IEEE
16 years 1 months ago
On-line Learning for Humanoid Robot Systems
Humanoid robots are high-dimensional movement systems for which analytical system identification and control methods are insufficient due to unknown nonlinearities in the system s...
Gaurav Tevatia, Jörg Conradt, Sethu Vijayakum...