Sciweavers

2236 search results - page 401 / 448
» Intrusion detection techniques and approaches
Sort
View
ICASSP
2011
IEEE
13 years 24 days ago
Further analysis of latent affective mapping for naturally expressive speech synthesis
An essential step in the generation of expressive speech synthesis is the automatic detection and classification of emotions most likely to be present in textual input. At last I...
Jerome R. Bellegarda
ICST
2011
IEEE
13 years 23 days ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...
ICDAR
2011
IEEE
12 years 8 months ago
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting
—We propose a new method for an effective removal of the printing artifacts occurring in historical newspapers which are caused by problems in the hot metal typesetting, a widely...
Iuliu Vasile Konya, Stefan Eickeler, Christoph Sei...
CVPR
2001
IEEE
14 years 11 months ago
Learning Models for Object Recognition
We consider learning models for object recognition from examples. Our method is motivated by systems that use the Hausdorff distance as a shape comparison measure. Typically an ob...
Pedro F. Felzenszwalb
CVPR
2007
IEEE
14 years 11 months ago
Semantic Hierarchies for Visual Object Recognition
In this paper we propose to use lexical semantic networks to extend the state-of-the-art object recognition techniques. We use the semantics of image labels to integrate prior kno...
Marcin Marszalek, Cordelia Schmid