Sciweavers

3639 search results - page 541 / 728
» Experiments on IPv6 Testing
Sort
View
PST
2008
13 years 11 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
SDM
2008
SIAM
136views Data Mining» more  SDM 2008»
13 years 11 months ago
Exploration and Reduction of the Feature Space by Hierarchical Clustering
In this paper we propose and test the use of hierarchical clustering for feature selection. The clustering method is Ward's with a distance measure based on GoodmanKruskal ta...
Dino Ienco, Rosa Meo
SDM
2008
SIAM
133views Data Mining» more  SDM 2008»
13 years 11 months ago
Semantic Smoothing for Bayesian Text Classification with Small Training Data
Bayesian text classifiers face a common issue which is referred to as data sparsity problem, especially when the size of training data is very small. The frequently used Laplacian...
Xiaohua Zhou, Xiaodan Zhang, Xiaohua Hu
SEBD
2008
169views Database» more  SEBD 2008»
13 years 11 months ago
Clustering the Feature Space
Abstract Dino Ienco and Rosa Meo Dipartimento di Informatica, Universit`a di Torino, Italy In this paper we propose and test the use of hierarchical clustering for feature selectio...
Dino Ienco, Rosa Meo
MVA
2007
132views Computer Vision» more  MVA 2007»
13 years 11 months ago
A Robust Coarse-to-Fine Method for Pupil Localization in Non-ideal Eye Images
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as i...
Xiaoyan Yuan, Pengfei Shi