Sciweavers

734 search results - page 135 / 147
» Feature analysis for architectural evaluation methods
Sort
View
JCS
2010
135views more  JCS 2010»
14 years 7 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
AVBPA
2005
Springer
395views Biometrics» more  AVBPA 2005»
14 years 11 months ago
A Score-Level Fusion Benchmark Database for Biometric Authentication
Fusing the scores of several biometric systems is a very promising approach to improve the overall system’s accuracy. Despite many works in the literature, it is surprising that ...
Norman Poh, Samy Bengio
ISMB
1993
14 years 10 months ago
Detection of Correlations in tRNA Sequences with Structural Implications
Using a flexible representation of biological sequences, we have performed a comparative analysis of 1208 known tRNA sequences. We believe we our technique is a more sensitive met...
Tod M. Klingler, Douglas L. Brutlag
MAMMO
2010
Springer
14 years 7 months ago
Classifying Breast Masses in Volumetric Whole Breast Ultrasound Data: A 2.5-Dimensional Approach
The aim of this paper is to investigate a 2.5-dimensional approach in classifying masses as benign or malignant in volumetric anisotropic voxel whole breast ultrasound data. In thi...
Gobert N. Lee, Toshiaki Okada, Daisuke Fukuoka, Ch...
INLG
2010
Springer
14 years 7 months ago
Finding Common Ground: Towards a Surface Realisation Shared Task
In many areas of NLP reuse of utility tools such as parsers and POS taggers is now common, but this is still rare in NLG. The subfield of surface realisation has perhaps come clos...
Anja Belz, Mike White, Josef van Genabith, Deirdre...