Sciweavers

20878 search results - page 3862 / 4176
» Database
Sort
View
JMLR
2010
156views more  JMLR 2010»
14 years 11 months ago
Collaborative Filtering on a Budget
Matrix factorization is a successful technique for building collaborative filtering systems. While it works well on a large range of problems, it is also known for requiring signi...
Alexandros Karatzoglou, Alexander J. Smola, Markus...
JMLR
2010
185views more  JMLR 2010»
14 years 11 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
JMLR
2010
141views more  JMLR 2010»
14 years 11 months ago
Pinview: Implicit Feedback in Content-Based Image Retrieval
This paper describes Pinview, a content-based image retrieval system that exploits implicit relevance feedback during a search session. Pinview contains several novel methods that...
Peter Auer, Zakria Hussain, Samuel Kaski, Arto Kla...
PAMI
2010
190views more  PAMI 2010»
14 years 11 months ago
Linear Regression for Face Recognition
In this paper, we present a novel approach of face identification by formulating the pattern recognition problem in terms of linear regression. Using a fundamental concept that pat...
Imran Naseem, Roberto Togneri, Mohammed Bennamoun
PR
2010
141views more  PR 2010»
14 years 11 months ago
On the vulnerability of face verification systems to hill-climbing attacks
In this paper, we use a hill-climbing attack algorithm based on Bayesian adaption to test the vulnerability of two face recognition systems to indirect attacks. The attacking tech...
Javier Galbally, Chris McCool, Julian Fiérr...
« Prev « First page 3862 / 4176 Last » Next »