Sciweavers

318 search results - page 59 / 64
» A comparison of machine learning techniques for phishing det...
Sort
View
SIGSOFT
2006
ACM
14 years 3 months ago
Memories of bug fixes
The change history of a software project contains a rich collection of code changes that record previous development experience. Changes that fix bugs are especially interesting, ...
Sunghun Kim, Kai Pan, E. James Whitehead Jr.
TASE
2008
IEEE
13 years 9 months ago
An Intelligent Online Monitoring and Diagnostic System for Manufacturing Automation
Condition monitoring and fault diagnosis in modern manufacturing automation is of great practical significance. It improves quality and productivity, and prevents damage to machine...
Ming Ge, Yangsheng Xu, Ruxu Du
MM
2004
ACM
219views Multimedia» more  MM 2004»
14 years 3 months ago
Multi-level annotation of natural scenes using dominant image components and semantic concepts
Automatic image annotation is a promising solution to enable semantic image retrieval via keywords. In this paper, we propose a multi-level approach to annotate the semantics of n...
Jianping Fan, Yuli Gao, Hangzai Luo
CORR
2010
Springer
237views Education» more  CORR 2010»
13 years 7 months ago
Featureless 2D-3D Pose Estimation by Minimising an Illumination-Invariant Loss
The problem of identifying the 3D pose of a known object from a given 2D image has important applications in Computer Vision ranging from robotic vision to image analysis. Our pro...
Srimal Jayawardena, Marcus Hutter, Nathan Brewer
KDD
2006
ACM
167views Data Mining» more  KDD 2006»
14 years 10 months ago
Identifying "best bet" web search results by mining past user behavior
The top web search result is crucial for user satisfaction with the web search experience. We argue that the importance of the relevance at the top position necessitates special h...
Eugene Agichtein, Zijian Zheng