Sciweavers

318 search results - page 49 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View

Publication
313views
14 years 10 months ago
Visual Surveillance: Dynamic Behavior Analysis at Multiple Levels
New cameras are installed daily all around the world. Hence it becomes increasingly important to develop methods for reducing the manual effort that is still required for video ana...
Michael D. Breitenstein
ICMLA
2009
14 years 7 months ago
Feature Extraction and Classification of EEG Signals for Rapid P300 Mind Spelling
The Mind Speller is a Brain-Computer Interface which enables subjects to spell text on a computer screen by detecting P300 Event-Related Potentials in their electroencephalograms....
Adrien Combaz, Nikolay V. Manyakov, Nikolay Chumer...
BMCBI
2006
100views more  BMCBI 2006»
14 years 10 months ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
CVIU
2007
146views more  CVIU 2007»
14 years 10 months ago
Face detection in gray scale images using locally linear embeddings
The problem of face detection remains challenging because faces are non-rigid objects that have a high degree of variability with respect to head rotation, illumination, facial ex...
Samuel Kadoury, Martin D. Levine
NOSSDAV
2010
Springer
15 years 2 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq