Sciweavers

1584 search results - page 200 / 317
» On Combining Multiple Classifiers Using an Evidential Approa...
Sort
View
148
Voted
IJCAI
2007
15 years 5 months ago
Computation of Initial Modes for K-modes Clustering Algorithm Using Evidence Accumulation
Clustering accuracy of partitional clustering algorithm for categorical data primarily depends upon the choice of initial data points (modes) to instigate the clustering process. ...
Shehroz S. Khan, Shri Kant
125
Voted
CSL
2010
Springer
15 years 3 months ago
Speech segmentation using regression fusion of boundary predictions
In the present work we study the appropriateness of a number of linear and non-linear regression methods, employed on the task of speech segmentation, for combining multiple phone...
Iosif Mporas, Todor Ganchev, Nikos Fakotakis
187
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 10 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
141
Voted
ACL
2012
13 years 6 months ago
Collective Generation of Natural Image Descriptions
We present a holistic data-driven approach to image description generation, exploiting the vast amount of (noisy) parallel image data and associated natural language descriptions ...
Polina Kuznetsova, Vicente Ordonez, Alexander C. B...
124
Voted
CCS
1999
ACM
15 years 8 months ago
Password Hardening Based on Keystroke Dynamics
We present a novel approach to improving the security of passwords. In our approach, the legitimate user’s typing patterns (e.g., durations of keystrokes and latencies between ke...
Fabian Monrose, Michael K. Reiter, Susanne Wetzel