Sciweavers

2414 search results - page 378 / 483
» Computing Normal Subgroups
Sort
View
AVBPA
2005
Springer
226views Biometrics» more  AVBPA 2005»
15 years 3 months ago
Discriminant Analysis Based on Kernelized Decision Boundary for Face Recognition
A novel nonlinear discriminant analysis method, Kernelized Decision Boundary Analysis (KDBA), is proposed in our paper, whose Decision Boundary feature vectors are the normal vecto...
Baochang Zhang, Xilin Chen, Wen Gao
CEAS
2005
Springer
15 years 3 months ago
Throttling Outgoing SPAM for Webmail Services
Spam has become a serious problem of Internet, and the current defense is limited to the filters deployed at the recipient side. Little known research has been applied to reduce ...
Zhenyu Zhong, Kun Huang, Kang Li
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 3 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht
FOSSACS
2005
Springer
15 years 3 months ago
Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
Modal logic has a good claim to being the logic of choice for describing the reactive behaviour of systems modeled as coalgebras. Logics with modal operators obtained from so-calle...
Lutz Schröder
GECCO
2005
Springer
158views Optimization» more  GECCO 2005»
15 years 3 months ago
Applying both positive and negative selection to supervised learning for anomaly detection
This paper presents a novel approach of applying both positive selection and negative selection to supervised learning for anomaly detection. It first learns the patterns of the n...
Xiaoshu Hang, Honghua Dai