Sciweavers

318 search results - page 50 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
ICCV
2009
IEEE
1363views Computer Vision» more  ICCV 2009»
16 years 3 months ago
Human Detection Using Partial Least Squares Analysis
Significant research has been devoted to detecting people in images and videos. In this paper we describe a human detection method that augments widely used edge-based features ...
William Robson Schwartz, Aniruddha Kembhavi, David...
CONEXT
2010
ACM
14 years 8 months ago
NEVERMIND, the problem is already fixed: proactively detecting and troubleshooting customer DSL problems
Traditional DSL troubleshooting solutions are reactive, relying mainly on customers to report problems, and tend to be labor-intensive, time consuming, prone to incorrect resoluti...
Yu Jin, Nick G. Duffield, Alexandre Gerber, Patric...
BMCBI
2010
183views more  BMCBI 2010»
14 years 10 months ago
Active learning for human protein-protein interaction prediction
Background: Biological processes in cells are carried out by means of protein-protein interactions. Determining whether a pair of proteins interacts by wet-lab experiments is reso...
Thahir P. Mohamed, Jaime G. Carbonell, Madhavi Gan...
ISPASS
2006
IEEE
15 years 4 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
ICMCS
2010
IEEE
198views Multimedia» more  ICMCS 2010»
14 years 11 months ago
Naming persons in news video with label propagation
Labeling persons appearing in video frames with names detected from the video transcript helps improving the video content identification and search task. We develop a face naming...
Phi The Pham, Marie-Francine Moens, Tinne Tuytelaa...