Sciweavers

8177 search results - page 279 / 1636
» Detecting System Emulators
Sort
View
TELSYS
2010
132views more  TELSYS 2010»
14 years 10 months ago
Defending the weakest link: phishing websites detection by analysing user behaviours
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites...
Xun Dong, John A. Clark, Jeremy L. Jacob
HICSS
2002
IEEE
130views Biometrics» more  HICSS 2002»
15 years 8 months ago
A Novel Method for Detecting Similar Documents
We describe a system for rapidly determining document similarity among a set of documents obtained from an information retrieval (IR) system. We obtain a ranked list of the most i...
James W. Cooper, Anni Coden, Eric W. Brown
ICRA
2010
IEEE
190views Robotics» more  ICRA 2010»
15 years 1 months ago
Active 3D scene segmentation and detection of unknown objects
Abstract— We present an active vision system for segmentation of visual scenes based on integration of several cues. The system serves as a visual front end for generation of obj...
Mårten Björkman, Danica Kragic
CHI
2008
ACM
16 years 3 months ago
Improving meeting capture by applying television production principles with audio and motion detection
Video recordings of meetings are often monotonous and tedious to watch. In this paper, we report on the design, implementation and evaluation of an automated meeting capture syste...
Abhishek Ranjan, Jeremy P. Birnholtz, Ravin Balakr...
EDBT
2009
ACM
105views Database» more  EDBT 2009»
15 years 10 months ago
Personalizing entity detection and recommendation with a fusion of web log mining techniques
Given the proliferation of technology sites and the growing diversity of their readership, readers are more and more likely to encounter specialized language and terminology that ...
Kathleen Tsoukalas, Bin Zhou 0002, Jian Pei, Davor...