Sciweavers

625 search results - page 87 / 125
» Improved Phishing Detection using Model-Based Features
Sort
View
125
Voted
GPEM
2007
119views more  GPEM 2007»
15 years 2 months ago
Genomic mining for complex disease traits with "random chemistry"
Our rapidly growing knowledge regarding genetic variation in the human genome offers great potential for understanding the genetic etiology of disease. This, in turn, could revolut...
Margaret J. Eppstein, Joshua L. Payne, Bill C. Whi...
APSCC
2008
IEEE
15 years 9 months ago
Integration and Implementation of Secured IP Based Surveillance Networks
— This paper presents a method of integration and implementation of transmitting video and audio data from multiple Internet Protocol (IP) surveillance cameras in a wireless sens...
Charles C. Castello, Jeffrey Fan, Te-Shun Chou, Ho...
147
Voted
CASES
2005
ACM
15 years 4 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
141
Voted
BMCBI
2006
132views more  BMCBI 2006»
15 years 2 months ago
Genome-wide DNA polymorphism analyses using VariScan
Background: DNA sequence polymorphisms analysis can provide valuable information on the evolutionary forces shaping nucleotide variation, and provides an insight into the function...
Stephan Hutter, Albert J. Vilella, Julio Rozas
CVPR
2009
IEEE
16 years 10 months ago
Convexity and Bayesian Constrained Local Models
The accurate localization of facial features plays a fundamental role in any face recognition pipeline. Constrained local models (CLM) provide an effective approach to localizati...
Ulrich Paquet (Imense Ltd)