Sciweavers

5575 search results - page 956 / 1115
» Information Extraction
Sort
View
DIM
2009
ACM
15 years 9 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
ICAPR
2009
Springer
15 years 9 months ago
Multisensor Biometric Evidence Fusion for Person Authentication Using Wavelet Decomposition and Monotonic-Decreasing Graph
—This paper presents a novel biometric sensor generated evidence fusion of face and palmprint images using wavelet decomposition for personnel identity verification. The approach...
Dakshina Ranjan Kisku, Jamuna Kanta Sing, Massimo ...
AIME
2001
Springer
15 years 9 months ago
Dynamic Adaptation of Cooperative Agents for MRI Brain Scans Segmentation
To cope with the difficulty of MRI brain scans automatic segmentation, we need to constrain and control the selection and the adjustment of processing tools depending on the local ...
Nathalie Richard, Michel Dojat, Catherine Garbay
HICSS
2000
IEEE
169views Biometrics» more  HICSS 2000»
15 years 9 months ago
A Software System for Spatial Data Analysis and Modeling
Advances in geographical information systems (GIS) and supporting data collection technology has resulted in the rapid collection of a huge amount of spatial data. However, known ...
Aleksandar Lazarevic, Tim Fiez, Zoran Obradovic
WISE
2000
Springer
15 years 8 months ago
Modelling the Webspace of an Intranet
Searching the internet using the currently available searchengines is not satisfactory. Thetechniquesused there focus on the extraction of relevant informationdirectlyfrom the doc...
Roelof van Zwol, Peter M. G. Apers