Sciweavers

625 search results - page 71 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
126
Voted
ICS
2010
Tsinghua U.
15 years 1 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
119
Voted
CVPR
2007
IEEE
16 years 4 months ago
Eigenboosting: Combining Discriminative and Generative Information
A major shortcoming of discriminative recognition and detection methods is their noise sensitivity, both during training and recognition. This may lead to very sensitive and britt...
Helmut Grabner, Peter M. Roth, Horst Bischof
122
Voted
MM
2004
ACM
117views Multimedia» more  MM 2004»
15 years 8 months ago
Singing voice detection in popular music
We propose a novel technique for the automatic classification of vocal and non-vocal regions in an acoustic musical signal. Our technique uses a combination of harmonic content a...
Tin Lay Nwe, Arun Shenoy, Ye Wang
168
Voted
ITC
1997
IEEE
129views Hardware» more  ITC 1997»
15 years 7 months ago
On Using Machine Learning for Logic BIST
This paper presents a new approach for designing test sequences to be generated on–chip. The proposed technique is based on machine learning, and provides a way to generate effi...
Christophe Fagot, Patrick Girard, Christian Landra...
131
Voted
DAC
2009
ACM
16 years 3 months ago
Computing bounds for fault tolerance using formal techniques
Continuously shrinking feature sizes result in an increasing susceptibility of circuits to transient faults, e.g. due to environmental radiation. Approaches to implement fault tol...
André Sülflow, Görschwin Fey, Rol...