Sciweavers

138 search results - page 20 / 28
» Detecting irregularities in regular patterns
Sort
View
ICML
2009
IEEE
14 years 8 months ago
Domain adaptation from multiple sources via auxiliary classifiers
We propose a multiple source domain adaptation method, referred to as Domain Adaptation Machine (DAM), to learn a robust decision function (referred to as target classifier) for l...
Lixin Duan, Ivor W. Tsang, Dong Xu, Tat-Seng Chua
AIRWEB
2008
Springer
13 years 9 months ago
Web spam identification through content and hyperlinks
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as we...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
CVPR
2012
IEEE
11 years 9 months ago
Laser speckle photography for surface tampering detection
It is often desirable to detect whether a surface has been touched, even when the changes made to that surface are too subtle to see in a pair of before and after images. To addre...
Yi-Chang Shih, Abe Davis, Samuel W. Hasinoff, Fr&e...
ICIAR
2004
Springer
14 years 22 days ago
Neuro-Fuzzy Method for Automated Defect Detection in Aluminium Castings
The automated flaw detection in aluminium castings consists of two steps: a) identification of potential defects using image processing techniques, and b) classification of pote...
Sergio Hernández, Doris Saez, Domingo Mery
SEKE
2010
Springer
13 years 5 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li