Sciweavers

125 search results - page 8 / 25
» Online Feature Selection using Grafting
Sort
View
94
Voted
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 6 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
86
Voted
CVPR
2007
IEEE
15 years 11 months ago
Learning Features for Tracking
We treat tracking as a matching problem of detected keypoints between successive frames. The novelty of this paper is to learn classifier-based keypoint descriptions allowing to i...
Michael Grabner, Helmut Grabner, Horst Bischof
ICFHR
2010
155views Biometrics» more  ICFHR 2010»
14 years 4 months ago
A Hybrid Model for Recognition of Online Handwriting in Indian Scripts
We present a complete online handwritten character recognition system for Indian languages that handles the ambiguities in segmentation as well as recognition of the strokes. The ...
Amit Arora, Anoop M. Namboodiri
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
15 years 10 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang
78
Voted
ICPR
2008
IEEE
15 years 4 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi