Sciweavers

5575 search results - page 883 / 1115
» Information Extraction
Sort
View
143
Voted
FLAIRS
2009
15 years 2 months ago
Analyzing Team Actions with Cascading HMM
While team action recognition has a relatively extended literature, less attention has been given to the detailed realtime analysis of the internal structure of the team actions. ...
Brandyn Allen White, Nate Blaylock, Ladislau B&oum...
CEAS
2011
Springer
14 years 5 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...
ICIP
2000
IEEE
16 years 6 months ago
Efficient Video Similarity Measurement and Search
We consider the use of meta-data and/or video-domain methods to detect similar videos on the web. Meta-data is extracted from the textual and hyperlink information associated with...
Sen-Ching S. Cheung, Avideh Zakhor
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 11 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
133
Voted
ICIAR
2004
Springer
15 years 10 months ago
Video Segmentation Through Multiscale Texture Analysis
Segmenting a video sequence into different coherent scenes requires analyzing those aspects which allow finding the changes where a transition is to be found. Textures are an imp...
Miguel Alemán-Flores, Luis Álvarez-L...