Sciweavers

380 search results - page 9 / 76
» Trajectory Based Behavior Analysis for User Verification
Sort
View
IJBC
2010
116views more  IJBC 2010»
14 years 6 months ago
Recurrence Plots for Symbolic Sequences
This paper introduces an extension of recurrence analysis to symbolic sequences. Heuristic arguments based on Shannon-McMillan-Breiman theorem suggest several relations between th...
Philippe Faure, Annick Lesne
ICMCS
2000
IEEE
100views Multimedia» more  ICMCS 2000»
15 years 1 months ago
About the Semantic Verification of SMIL Documents
This paper presents a formal approach based on the RTLOTOS formal description technique for the semantic verification of SMIL documents. The reachability analysis of RT-LOTOS spec...
Paulo Nazareno Maia Sampaio, C. A. S. Santos, Jean...
DAGSTUHL
2007
14 years 11 months ago
Exploiting Community Behavior for Enhanced Link Analysis and Web Search
Methods for Web link analysis and authority ranking such as PageRank are based on the assumption that a user endorses a Web page when creating a hyperlink to this page. There is a...
Julia Luxenburger, Gerhard Weikum
ICASSP
2011
IEEE
14 years 1 months ago
A robust feature extraction algorithm based on class-Modular Image Principal Component Analysis for face verification
Face verification systems reach good performance on ideal environmental conditions. Conversely, they are very sensitive to non-controlled environments. This work proposes the cla...
Jose Francisco Pereira, Rafael M. Barreto, George ...
WWW
2008
ACM
15 years 10 months ago
User behavior oriented web spam detection
Combating Web spam has become one of the top challenges for Web search engines. State-of-the-art spam detection techniques are usually designed for specific known types of Web spa...
Yiqun Liu, Min Zhang, Shaoping Ma, Liyun Ru