Sciweavers

487 search results - page 80 / 98
» Detecting Link Spam Using Temporal Information
Sort
View
JMLR
2002
133views more  JMLR 2002»
14 years 9 months ago
Learning Precise Timing with LSTM Recurrent Networks
The temporal distance between events conveys information essential for numerous sequential tasks such as motor control and rhythm detection. While Hidden Markov Models tend to ign...
Felix A. Gers, Nicol N. Schraudolph, Jürgen S...
CIVR
2007
Springer
139views Image Analysis» more  CIVR 2007»
15 years 3 months ago
Video search in concept subspace: a text-like paradigm
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...
Xirong Li, Dong Wang, Jianmin Li, Bo Zhang
MSR
2010
ACM
15 years 2 months ago
Validity of network analyses in Open Source Projects
—Social network methods are frequently used to analyze networks derived from Open Source Project communication and collaboration data. Such studies typically discover patterns in...
Roozbeh Nia, Christian Bird, Premkumar T. Devanbu,...
ISBI
2006
IEEE
15 years 10 months ago
Bayesian tracking for fluorescence microscopic imaging
Fluorescence microscopy is a powerful imaging tool for studying molecular dynamics in living cells. For quantitative motion analysis of subcellular structures robust and accurate ...
Ihor Smal, Wiro J. Niessen, Erik H. W. Meijering
133
Voted
DASC
2006
IEEE
15 years 3 months ago
On Recognizing Virtual Honeypots and Countermeasures
— Honeypots are decoys designed to trap, delay, and gather information about attackers. We can use honeypot logs to analyze attackers’ behaviors and design new defenses. A virt...
Xinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin St...