Sciweavers

2016 search results - page 324 / 404
» Distributed error confinement
Sort
View
FC
2008
Springer
107views Cryptology» more  FC 2008»
13 years 9 months ago
Evaluating the Wisdom of Crowds in Assessing Phishing Websites
Abstract. We examine the structure and outcomes of user participation in PhishTank, a phishing-report collator. Anyone who wishes may submit URLs of suspected phishing websites, an...
Tyler Moore, Richard Clayton
LREC
2010
178views Education» more  LREC 2010»
13 years 9 months ago
Data Issues in English-to-Hindi Machine Translation
Statistical machine translation to morphologically richer languages is a challenging task and more so if the source and target languages differ in word order. Current state-of-the...
Ondrej Bojar, Pavel Stranák, Daniel Zeman
DRR
2008
13 years 9 months ago
Whole-book recognition using mutual-entropy-driven model adaptation
We describe an approach to unsupervised high-accuracy recognition of the textual contents of an entire book using fully automatic mutual-entropy-based model adaptation. Given imag...
Pingping Xiu, Henry S. Baird
MOBIMEDIA
2007
13 years 9 months ago
Adaptive link layer protocols for shared wireless links
— The error prone nature of wireless links often necessitates the use of a link layer protocol to ensure acceptable application performance. While traditional link layers assume ...
George Xylomenos, Michael Makidis
MVA
2007
132views Computer Vision» more  MVA 2007»
13 years 9 months ago
A Robust Coarse-to-Fine Method for Pupil Localization in Non-ideal Eye Images
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as i...
Xiaoyan Yuan, Pengfei Shi