Sciweavers

954 search results - page 142 / 191
» A Modular Approach to Packet Classification: Algorithms and ...
Sort
View
ICIP
2003
IEEE
14 years 10 months ago
Sirface vs. Fisherface: recognition using class specific linear projection
Using a novel data dimension reduction method proposed in statistics, we develop an appearance-based face recognition algorithm which is insensitive to large variation in lighting...
Yangrong Ling, Xiangrong Yin, Suchendra M. Bhandar...
WWW
2008
ACM
14 years 9 months ago
Can chinese web pages be classified with english data source?
As the World Wide Web in China grows rapidly, mining knowledge in Chinese Web pages becomes more and more important. Mining Web information usually relies on the machine learning ...
Xiao Ling, Gui-Rong Xue, Wenyuan Dai, Yun Jiang, Q...
FOCS
1992
IEEE
14 years 28 days ago
On the Fault Tolerance of Some Popular Bounded-Degree Networks
In this paper, we analyze the fault tolerance of several bounded-degree networks that are commonly used for parallel computation. Among other things, we show that an N-node butterf...
Frank Thomson Leighton, Bruce M. Maggs, Ramesh K. ...
ICIP
2008
IEEE
14 years 10 months ago
People re-detection using Adaboost with sift and color correlogram
People re-detection aims at performing re-identification of people who leave the scene and reappear after some time. This is an important problem especially in video surveillance ...
Lei Hu, Shuqiang Jiang, Qingming Huang, Wen Gao
HAIS
2010
Springer
14 years 1 months ago
CBRid4SQL: A CBR Intrusion Detector for SQL Injection Attacks
One of the most serious security threats to recently deployed databases has been the SQL Injection attack. This paper presents an agent specialised in the detection of SQL injectio...
Cristian Pinzón, Álvaro Herrero, Jua...