Sciweavers

2037 search results - page 315 / 408
» Chunking with Support Vector Machines
Sort
View
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 3 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...
ICCV
2007
IEEE
14 years 3 months ago
A reliable skin mole localization scheme
Mole pattern changes are important cues in detecting melanoma at an early stage. As a first step to automatically register mole pattern changes from skin images, this paper prese...
Taeg Sang Cho, William T. Freeman, Hensin Tsao
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
14 years 3 months ago
Failure Prediction in IBM BlueGene/L Event Logs
Frequent failures are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in size and compl...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
ICIP
2007
IEEE
14 years 3 months ago
Learning Appearance Primitives of Iris Images for Ethnic Classification
Iris pattern is commonly regarded as a kind of phenotypic feature without relation to genes. In our previous work, we argued that iris texture is race related, and its genetic inf...
Xianchao Qiu, Zhenan Sun, Tieniu Tan
ICMCS
2007
IEEE
406views Multimedia» more  ICMCS 2007»
14 years 3 months ago
3D Haar-Like Features for Pedestrian Detection
One basic observation for pedestrian detection in video sequences is that both appearance and motion information are important to model the moving people. Based on this observatio...
Xinyi Cui, Yazhou Liu, Shiguang Shan, Xilin Chen, ...