Sciweavers

136 search results - page 18 / 28
» Comparative Assessment of the Effectiveness of Online Vs Pap...
Sort
View
INFFUS
2002
162views more  INFFUS 2002»
14 years 9 months ago
Fusion of multiple classifiers
The security of computer networks plays a strategic role in modern computer systems. In order to enforce high protection levels against threats, a number of software tools have be...
Fabio Roli, Josef Kittler
ICASSP
2010
IEEE
14 years 9 months ago
Removing illumination artifacts from face images using the nuisance attribute projection
Illumination induced appearance changes represent one of the open challenges in automated face recognition systems still significantly influencing their performance. Several tec...
Vitomir Struc, Bostjan Vesnicer, France Mihelic, N...
NOMS
2010
IEEE
222views Communications» more  NOMS 2010»
14 years 8 months ago
Bayesian decision aggregation in collaborative intrusion detection networks
—Cooperation between intrusion detection systems (IDSs) allows collective information and experience from a network of IDSs to be shared to improve the accuracy of detection. A c...
Carol J. Fung, Quanyan Zhu, Raouf Boutaba, Tamer B...
84
Voted
RECOMB
2009
Springer
15 years 10 months ago
How Many Bootstrap Replicates Are Necessary?
Phylogenetic Bootstrapping (BS) is a standard technique for inferring confidence values on phylogenetic trees that is based on reconstructing many trees from minor variations of th...
Nicholas D. Pattengale, Masoud Alipour, Olaf R. P....
CSE
2009
IEEE
15 years 1 months ago
Churn Prediction in MMORPGs: A Social Influence Based Approach
Massively Multiplayer Online Role Playing Games (MMORPGs) are computer based games in which players interact with one another in the virtual world. Worldwide revenues for MMORPGs h...
Jaya Kawale, Aditya Pal, Jaideep Srivastava