Sciweavers

625 search results - page 71 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
ICS
2010
Tsinghua U.
13 years 6 months ago
Decomposable and responsive power models for multicore processors using performance counters
Abstract—Power modeling based on performance monitoring counters (PMCs) has attracted the interest of many researchers since it become a quick approach to understand and analyse ...
Ramon Bertran, Marc González, Xavier Martor...
CVPR
2007
IEEE
14 years 9 months ago
Eigenboosting: Combining Discriminative and Generative Information
A major shortcoming of discriminative recognition and detection methods is their noise sensitivity, both during training and recognition. This may lead to very sensitive and britt...
Helmut Grabner, Peter M. Roth, Horst Bischof
MM
2004
ACM
117views Multimedia» more  MM 2004»
14 years 1 months ago
Singing voice detection in popular music
We propose a novel technique for the automatic classification of vocal and non-vocal regions in an acoustic musical signal. Our technique uses a combination of harmonic content a...
Tin Lay Nwe, Arun Shenoy, Ye Wang
ITC
1997
IEEE
129views Hardware» more  ITC 1997»
13 years 12 months ago
On Using Machine Learning for Logic BIST
This paper presents a new approach for designing test sequences to be generated on–chip. The proposed technique is based on machine learning, and provides a way to generate effi...
Christophe Fagot, Patrick Girard, Christian Landra...
DAC
2009
ACM
14 years 8 months ago
Computing bounds for fault tolerance using formal techniques
Continuously shrinking feature sizes result in an increasing susceptibility of circuits to transient faults, e.g. due to environmental radiation. Approaches to implement fault tol...
André Sülflow, Görschwin Fey, Rol...