Sciweavers

625 search results - page 117 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
ICASSP
2011
IEEE
12 years 11 months ago
Forensically inspired approaches to automatic speaker recognition
This paper presents ongoing research leveraging forensic methods for automatic speaker recognition. Some of the methods forensic scientists employ include identifying speaker dist...
Kyu J. Han, Mohamed Kamal Omar, Jason W. Pelecanos...
CVPR
2009
IEEE
13 years 11 months ago
Learning to associate: HybridBoosted multi-target tracker for crowded scene
We propose a learning-based hierarchical approach of multi-target tracking from a single camera by progressively associating detection responses into longer and longer track fragm...
Yuan Li, Chang Huang, Ram Nevatia
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 9 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
BMCBI
2008
86views more  BMCBI 2008»
13 years 7 months ago
Predicting protein linkages in bacteria: Which method is best depends on task
Background: Applications of computational methods for predicting protein functional linkages are increasing. In recent years, several bacteria-specific methods for predicting link...
Anis Karimpour-Fard, Sonia M. Leach, Ryan T. Gill,...
SDM
2010
SIAM
226views Data Mining» more  SDM 2010»
13 years 9 months ago
Two-View Transductive Support Vector Machines
Obtaining high-quality and up-to-date labeled data can be difficult in many real-world machine learning applications, especially for Internet classification tasks like review spam...
Guangxia Li, Steven C. H. Hoi, Kuiyu Chang