Sciweavers

1792 search results - page 110 / 359
» Discriminative Methods for Transliteration
Sort
View
ECRIME
2007
15 years 4 months ago
Fighting unicode-obfuscated spam
In the last few years, obfuscation has been used more and more by spammers to make spam emails bypass filters. The standard method is to use images that look like text, since typi...
Changwei Liu, Sid Stamm
89
Voted
MA
2010
Springer
122views Communications» more  MA 2010»
14 years 11 months ago
Thresholding methods to estimate copula density
Abstract: This paper deals with the problem of multivariate copula density estimation. Using wavelet methods we provide two shrinkage procedures based on thresholding rules for whi...
F. Autin, E. Le Pennec, K. Tribouley
100
Voted
MVA
2000
155views Computer Vision» more  MVA 2000»
15 years 2 months ago
Virtual Subspace Method for Robust Face Recognition Independent of Lighting Conditions
A concept of virtual subspace is introduced for realizing a robust face recognition independent of the lighting conditions. The virtual subspace is a paradoxical concept because i...
Takeshi Shakunaga, Nobumasa Yamamoto
114
Voted
KES
2007
Springer
15 years 7 months ago
A Hierarchical Clustering Method for Semantic Knowledge Bases
Abstract. This work presents a clustering method which can be applied to relational knowledge bases. Namely, it can be used to discover interesting groupings of semantically annota...
Nicola Fanizzi, Claudia d'Amato
102
Voted
IEEEICCI
2008
IEEE
15 years 7 months ago
Improved offline signature verification scheme using feature point extraction method
In this paper a novel offline signature verification scheme has been proposed. The scheme is based on selecting 60 feature points from the geometric centre of the signature and co...
Debasish Jena, Banshidhar Majhi, Saroj Kumar Panig...