Sciweavers

908 search results - page 13 / 182
» Additional methods when using email for teaching
Sort
View
CVPR
2008
IEEE
15 years 11 months ago
Unsupervised learning of probabilistic object models (POMs) for object classification, segmentation and recognition
We present a new unsupervised method to learn unified probabilistic object models (POMs) which can be applied to classification, segmentation, and recognition. We formulate this a...
Yuanhao Chen, Long Zhu, Alan L. Yuille, HongJiang ...
CCS
2007
ACM
15 years 3 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
BMCBI
2007
134views more  BMCBI 2007»
14 years 9 months ago
A framework for significance analysis of gene expression data using dimension reduction methods
Background: The most popular methods for significance analysis on microarray data are well suited to find genes differentially expressed across predefined categories. However, ide...
Lars Halvor Gidskehaug, Endre Anderssen, Arnar Fla...
CEAS
2007
Springer
15 years 3 months ago
Hardening Fingerprinting by Context
Near-duplicate detection is not only an important pre and post processing task in Information Retrieval but also an effective spam-detection technique. Among different approache...
Aleksander Kolcz, Abdur Chowdhury
JOT
2006
104views more  JOT 2006»
14 years 9 months ago
Call-out Bracket Methods in Timor
This paper extends the concept of qualifying types by describing how their implementations can include not only bracket methods which are applied when a method of a target object ...
James Leslie Keedy, Klaus Espenlaub, Christian Hei...