Sciweavers

625 search results - page 102 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
CODES
2004
IEEE
13 years 11 months ago
Operation tables for scheduling in the presence of incomplete bypassing
Register bypassing is a powerful and widely used feature in modern processors to eliminate certain data hazards. Although complete bypassing is ideal for performance, bypassing ha...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
KDD
2007
ACM
139views Data Mining» more  KDD 2007»
14 years 8 months ago
Raising the baseline for high-precision text classifiers
Many important application areas of text classifiers demand high precision and it is common to compare prospective solutions to the performance of Naive Bayes. This baseline is us...
Aleksander Kolcz, Wen-tau Yih
WACV
2005
IEEE
14 years 1 months ago
Automatic 2D Hand Tracking in Video Sequences
In gesture and sign language video sequences, hand motion tends to be rapid, and hands frequently appear in front of each other or in front of the face. Thus, hand location is oft...
Quan Yuan, Stan Sclaroff, Vassilis Athitsos
SIGGRAPH
1995
ACM
13 years 11 months ago
Versatile and efficient techniques for simulating cloth and other deformable objects
We are presenting techniques for simulating the motion and the deformation of cloth, fabrics or, more generally, deformable surfaces. Our main goal is to be able to simulate any k...
Pascal Volino, Martin Courchesne, Nadia Magnenat-T...
AROBOTS
2002
67views more  AROBOTS 2002»
13 years 7 months ago
A System for Semi-Autonomous Tractor Operations
Tractors are the workhorses of the modern farm. By automating these machines, we can increase the productivity, improve safety, and reduce costs for many agricultural operations. ...
Anthony Stentz, Cristian Dima, Carl Wellington, He...