Sciweavers

868 search results - page 146 / 174
» On Analog Signature Analysis
Sort
View
SIGIR
2010
ACM
15 years 1 months ago
Adaptive near-duplicate detection via similarity learning
In this paper, we present a novel near-duplicate document detection method that can easily be tuned for a particular domain. Our method represents each document as a real-valued s...
Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz
3DPVT
2006
IEEE
247views Visualization» more  3DPVT 2006»
15 years 1 months ago
Contour-Based Object Detection in Range Images
This paper presents a novel object recognition approach based on range images. Due to its insensitivity to illumination, range data is well suited for reliable silhouette extracti...
Stefan Stiene, Kai Lingemann, Andreas Nüchter...
ACSAC
2004
IEEE
15 years 1 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
ICISC
2004
169views Cryptology» more  ICISC 2004»
14 years 11 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
BMVC
1998
14 years 11 months ago
Writer Identification from Non-uniformly Skewed Handwriting Images
Many techniques have been reported for handwriting-based writer identification. Most such techniques assume that the written text is fixed (e.g., in signature verification). In th...
H. E. S. Said, G. S. Peake, T. N. Tan, Keith D. Ba...