Sciweavers

2782 search results - page 107 / 557
» Pattern Recognition
Sort
View
HIP
2005
Springer
168views Cryptology» more  HIP 2005»
15 years 3 months ago
Leveraging the CAPTCHA Problem
Efforts to defend against automated attacks on e-commerce services have led to a new security protocol known as a CAPTCHA, a challenge designed to exploit gaps in the perceptual a...
Daniel P. Lopresti
MCS
2005
Springer
15 years 3 months ago
Which Is the Best Multiclass SVM Method? An Empirical Study
Abstract. Multiclass SVMs are usually implemented by combining several two-class SVMs. The one-versus-all method using winner-takes-all strategy and the one-versus-one method imple...
Kaibo Duan, S. Sathiya Keerthi
SLSFS
2005
Springer
15 years 3 months ago
Discrete Component Analysis
Abstract. This article presents a unified theory for analysis of components in discrete data, and compares the methods with techniques such as independent component analysis, non-...
Wray L. Buntine, Aleks Jakulin
VLBV
2005
Springer
15 years 3 months ago
An Intermediate Expressions' Generator System in the MPEG-4 Framework
A lifelike human face can enhance interactive applications by providing straightforward feedback to and from the users and stimulating emotional responses from them. An expressive...
Amaryllis Raouzaiou, Evaggelos Spyrou, Kostas Karp...
IBPRIA
2009
Springer
15 years 2 months ago
Score Fusion by Maximizing the Area under the ROC Curve
Information fusion is currently a very active research topic aimed at improving the performance of biometric systems. This paper proposes a novel method for optimizing the paramete...
Mauricio Villegas, Roberto Paredes