Sciweavers

380 search results - page 9 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
120
Voted
IJBC
2010
116views more  IJBC 2010»
15 years 2 months ago
Recurrence Plots for Symbolic Sequences
This paper introduces an extension of recurrence analysis to symbolic sequences. Heuristic arguments based on Shannon-McMillan-Breiman theorem suggest several relations between th...
Philippe Faure, Annick Lesne
ICMCS
2000
IEEE
100views Multimedia» more  ICMCS 2000»
15 years 9 months ago
About the Semantic Verification of SMIL Documents
This paper presents a formal approach based on the RTLOTOS formal description technique for the semantic verification of SMIL documents. The reachability analysis of RT-LOTOS spec...
Paulo Nazareno Maia Sampaio, C. A. S. Santos, Jean...
DAGSTUHL
2007
15 years 6 months ago
Exploiting Community Behavior for Enhanced Link Analysis and Web Search
Methods for Web link analysis and authority ranking such as PageRank are based on the assumption that a user endorses a Web page when creating a hyperlink to this page. There is a...
Julia Luxenburger, Gerhard Weikum
134
Voted
ICASSP
2011
IEEE
14 years 8 months ago
A robust feature extraction algorithm based on class-Modular Image Principal Component Analysis for face verification
Face verification systems reach good performance on ideal environmental conditions. Conversely, they are very sensitive to non-controlled environments. This work proposes the cla...
Jose Francisco Pereira, Rafael M. Barreto, George ...
WWW
2008
ACM
16 years 5 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru