Sciweavers

788 search results - page 119 / 158
» An Experiment on the Effect of Design Recording on Impact An...
Sort
View
DIM
2008
ACM
13 years 9 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
KDD
2003
ACM
180views Data Mining» more  KDD 2003»
14 years 9 months ago
Classifying large data sets using SVMs with hierarchical clusters
Support vector machines (SVMs) have been promising methods for classification and regression analysis because of their solid mathematical foundations which convey several salient ...
Hwanjo Yu, Jiong Yang, Jiawei Han
ICPP
2008
IEEE
14 years 2 months ago
A Replication Overlay Assisted Resource Discovery Service for Federated Systems
Abstract—Federated systems have recently attracted much attention because they allow loosely coupled organizations to share resources for common benefits. However, discovering r...
Hao Yang, Fan Ye, Zhen Liu
ICDAR
2009
IEEE
14 years 3 months ago
Error-Correcting Output Coding for the Convolutional Neural Network for Optical Character Recognition
It is known that convolutional neural networks (CNNs) are efficient for optical character recognition (OCR) and many other visual classification tasks. This paper applies error-co...
Huiqun Deng, George Stathopoulos, Ching Y. Suen
ECRTS
2010
IEEE
13 years 9 months ago
Making DRAM Refresh Predictable
Embedded control systems with hard real-time constraints require that deadlines are met at all times or the system may malfunction with potentially catastrophic consequences. Sched...
Balasubramanya Bhat, Frank Mueller