Sciweavers

809 search results - page 112 / 162
» Experiments with Cost-Sensitive Feature Evaluation
Sort
View
JCS
2010
135views more  JCS 2010»
13 years 9 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
COMMA
2006
14 years 12 days ago
CBR and Argument Schemes for Collaborative Decision Making
In this paper we present a novel approach for combining Case-Based Reasoning (CBR) and Argumentation. This approach involves 1) the use of CBR for evaluating the arguments submitt...
Pancho Tolchinsky, Sanjay Modgil, Ulises Cort&eacu...
TOMACS
1998
140views more  TOMACS 1998»
13 years 10 months ago
Technical Note: A Hierarchical Computer Architecture Design and Simulation Environment
architectures at multiple levels of abstraction, encompassing both hardware and software. It has five modes of operation (Design, Model Validation, Build Simulation, Simulate Syste...
Paul S. Coe, Fred W. Howell, Roland N. Ibbett, Lau...
CVPR
2000
IEEE
15 years 1 months ago
Optimizing Learning in Image Retrieval
Combining learning with vision techniques in interactive image retrieval has been an active research topic during the past few years. However, existing learning techniques either ...
Yong Rui, Thomas S. Huang
ICCV
2001
IEEE
15 years 28 days ago
Plane-based Projective Reconstruction
A linear method for computing a projective reconstruction from a large number of images is presented and then evaluated. The method uses planar homographies between views to linea...
Robert Kaucic, Richard I. Hartley, Nicolas Y. Dano