Sciweavers

625 search results - page 111 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
ICMI
2005
Springer
136views Biometrics» more  ICMI 2005»
14 years 1 months ago
Contextual recognition of head gestures
Head pose and gesture offer several key conversational grounding cues and are used extensively in face-to-face interaction among people. We investigate how dialog context from an ...
Louis-Philippe Morency, Candace L. Sidner, Christo...
BMCBI
2010
165views more  BMCBI 2010»
13 years 7 months ago
Filtering, FDR and power
Background: In high-dimensional data analysis such as differential gene expression analysis, people often use filtering methods like fold-change or variance filters in an attempt ...
Maarten van Iterson, Judith M. Boer, Renée ...
DEXA
2006
Springer
197views Database» more  DEXA 2006»
13 years 9 months ago
Cleaning Web Pages for Effective Web Content Mining
Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit webpage organization applications (e.g., keyword-bas...
Jing Li, Christie I. Ezeife
ISPD
2003
ACM
110views Hardware» more  ISPD 2003»
14 years 23 days ago
Explicit gate delay model for timing evaluation
Delay evaluation is always a crucial concern in the VLSI design and it becomes increasingly more critical in the nowadays deep-submicron technology. To obtain an accurate delay va...
Muzhou Shao, Martin D. F. Wong, Huijing Cao, Youxi...
LISA
2008
13 years 9 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar