Sciweavers

272 search results - page 26 / 55
» Detecting Altered Fingerprints
Sort
View
DAC
2001
ACM
16 years 4 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
SIGIR
2008
ACM
15 years 3 months ago
Local text reuse detection
Text reuse occurs in many different types of documents and for many different reasons. One form of reuse, duplicate or near-duplicate documents, has been a focus of researchers be...
Jangwon Seo, W. Bruce Croft
AAAI
2007
15 years 5 months ago
COD: Online Temporal Clustering for Outbreak Detection
We present Cluster Onset Detection (COD), a novel algorithm to aid in detection of epidemic outbreaks. COD employs unsupervised learning techniques in an online setting to partiti...
Tomás Singliar, Denver Dash
106
Voted
PUC
2002
86views more  PUC 2002»
15 years 3 months ago
Smart CAPs for Smart Its - Context Detection for Mobile Users
Context detection for mobile users plays a major role for enabling novel, human-centric interfaces. For this, we introduce a context detection scheme for disseminated, computer em...
Florian Michahelles, Michael Samulowitz
107
Voted
CEAS
2004
Springer
15 years 9 months ago
The Impact of Feature Selection on Signature-Driven Spam Detection
Signature-driven spam detection provides an alternative to machine learning approaches and can be very effective when near-duplicates of essentially the same message are sent in h...
Aleksander Kolcz, Abdur Chowdhury, Joshua Alspecto...