Sciweavers

419 search results - page 67 / 84
» Is a detector only good for detection
Sort
View
SP
2009
IEEE
128views Security Privacy» more  SP 2009»
14 years 2 months ago
Fingerprinting Blank Paper Using Commodity Scanners
This paper presents a novel technique for authenticating physical documents based on random, naturally occurring imperfections in paper texture. We introduce a new method for meas...
William Clarkson, Tim Weyrich, Adam Finkelstein, N...
SMC
2007
IEEE
151views Control Systems» more  SMC 2007»
14 years 1 months ago
Growing recurrent self organizing map
— The growing Recurrent Self-Organizing Map (GRSOM) is embedded into a standard Self-Organizing Map (SOM) hierarchy. To do so, the KDD benchmark dataset from the International Kn...
Ozge Yeloglu, A. Nur Zincir-Heywood, Malcolm I. He...
HIPEAC
2005
Springer
14 years 1 months ago
Arc3D: A 3D Obfuscation Architecture
In DRM domain, the adversary has complete control of the computing node - supervisory privileges along with full physical as well as architectural object observational capabilities...
Mahadevan Gomathisankaran, Akhilesh Tyagi
ICDAR
2009
IEEE
14 years 2 months ago
Fast Incremental Learning Strategy Driven by Confusion Reject for Online Handwriting Recognition
In this paper, we present a new incremental learning strategy for handwritten character recognition systems. This learning strategy enables the recognition system to learn “rapi...
Abdullah Almaksour, Éric Anquetil
KDD
2008
ACM
195views Data Mining» more  KDD 2008»
14 years 8 months ago
Learning from multi-topic web documents for contextual advertisement
Contextual advertising on web pages has become very popular recently and it poses its own set of unique text mining challenges. Often advertisers wish to either target (or avoid) ...
Yi Zhang, Arun C. Surendran, John C. Platt, Mukund...