Sciweavers

741 search results - page 85 / 149
» An Analysis of Rule Evaluation Metrics
Sort
View
JMLR
2006
147views more  JMLR 2006»
13 years 8 months ago
Spam Filtering Based On The Analysis Of Text Information Embedded Into Images
In recent years anti-spam filters have become necessary tools for Internet service providers to face up to the continuously growing spam phenomenon. Current server-side anti-spam ...
Giorgio Fumera, Ignazio Pillai, Fabio Roli
ICIP
2005
IEEE
14 years 1 months ago
View independent face recognition based on kernel principal component analysis of local parts
This paper presents a view independent face recognition method based on kernel principal component analysis (KPCA) of local parts. View changes induce large variation in feature s...
Koji Hotta
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
HICSS
2006
IEEE
114views Biometrics» more  HICSS 2006»
14 years 2 months ago
Game Theoretical Analysis of Cooperative Sourcing Scenarios
As an emerging trend in outsourcing, cooperative sourcing is the merging of similar processes of several firms when, for example, several banks merge their payments processing and...
Daniel Beimborn, Hermann-Josef Lamberti, Tim Weitz...
CSL
2008
Springer
13 years 8 months ago
Applying an analysis of acted vocal emotions to improve the simulation of synthetic speech
: All speech produced by humans includes information about the speaker, including conveying the emotional state of the speaker. It is thus desirable to include vocal affect in any ...
Iain R. Murray, John L. Arnott