Sciweavers

1583 search results - page 192 / 317
» Stability of Feature Selection Algorithms
Sort
View
MM
2009
ACM
185views Multimedia» more  MM 2009»
15 years 9 months ago
Deep exploration for experiential image retrieval
Experiential image retrieval systems aim to provide the user with a natural and intuitive search experience. The goal is to empower the user to navigate large collections based on...
Bart Thomee, Mark J. Huiskes, Erwin M. Bakker, Mic...
ICCV
2005
IEEE
15 years 9 months ago
Contour-Based Learning for Object Detection
We present a novel categorical object detection scheme that uses only local contour-based features. A two-stage, partially supervised learning architecture is proposed: a rudiment...
Jamie Shotton, Andrew Blake, Roberto Cipolla
EVOW
2004
Springer
15 years 8 months ago
Analysis of Proteomic Pattern Data for Cancer Detection
Abstract. In this paper we analyze two proteomic pattern datasets containing measurements from ovarian and prostate cancer samples. In particular, a linear and a quadratic support ...
Kees Jong, Elena Marchiori, Aad van der Vaart
CIDM
2007
IEEE
15 years 3 months ago
Detection of Unknown Computer Worms Activity Based on Computer Behavior using Data Mining
— Detecting unknown worms is a challenging task. Extant solutions, such as anti-virus tools, rely mainly on prior explicit knowledge of specific worm signatures. As a result, aft...
Robert Moskovitch, Ido Gus, Shay Pluderman, Dima S...
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 12 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos