Sciweavers

3072 search results - page 555 / 615
» Shape analysis algorithm based on information theory
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 6 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
ICIP
2000
IEEE
15 years 11 months ago
Hierarchical Representation and Coding of Surfaces Using 3D Polygon Meshes
This paper presents a novel procedure for the representation and coding of 3D surfaces using hierarchical adaptive triangulation. The proposed procedure is based on pyramidal anal...
Ioannis Kompatsiaris, Michael G. Strintzis
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
DIWEB
2001
14 years 11 months ago
Converting XML Data To UML Diagrams For Conceptual Data Integration
The demand for data integration is rapidly becoming larger as more and more information sources appear in modern enterprises. In many situations a logical (rather than physical) i...
Mikael R. Jensen, Thomas H. Møller, Torben ...
JMM2
2007
148views more  JMM2 2007»
14 years 9 months ago
Object Segmentation Using Background Modelling and Cascaded Change Detection
— The automatic extraction and analysis of visual information is becoming generalised. The first step in this processing chain is usually separating or segmenting the captured v...
Luís Filipe Teixeira, Jaime S. Cardoso, Lu&...