Sciweavers

2643 search results - page 488 / 529
» A fast feature extraction method
Sort
View
CONEXT
2008
ACM
13 years 10 months ago
Internet traffic classification demystified: myths, caveats, and the best practices
Recent research on Internet traffic classification algorithms has yielded a flurry of proposed approaches for distinguishing types of traffic, but no systematic comparison of the ...
Hyunchul Kim, Kimberly C. Claffy, Marina Fomenkov,...
DICTA
2007
13 years 10 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran
MVA
2007
210views Computer Vision» more  MVA 2007»
13 years 10 months ago
Represent Image Contents Using Curves and Chain Code
This paper presents a new approach to extracting and representing structural features of images. The approach is based on both a region-based analysis and a contour-based analysis...
Pornchai Mongkolnam, Chakarida Nukoolkit, Thanee D...
ACSW
2004
13 years 10 months ago
A wavelet-based neuro-fuzzy system for data mining small image sets
Creating a robust image classification system depends on having enough data with which one can adequately train and validate the model. If there is not enough available data, this...
Brendon J. Woodford, Da Deng, George L. Benwell
ACSW
2004
13 years 10 months ago
Mining Association Rules from XML Data using XQuery
In recent years XML has became very popular for representing semistructured data and a standard for data exchange over the web. Mining XML data from the web is becoming increasing...
Jacky W. W. Wan, Gillian Dobbie