Sciweavers

179 search results - page 9 / 36
» Learning at Low False Positive Rates
Sort
View
CVPR
2003
IEEE
14 years 9 months ago
A Bayesian Framework for Fusing Multiple Word Knowledge Models in Videotext Recognition
Videotext recognition is challenging due to low resolution, diverse fonts/styles, and cluttered background. Past methods enhanced recognition by using multiple frame averaging, im...
DongQing Zhang, Shih-Fu Chang
ESEM
2008
ACM
13 years 9 months ago
An empirical model to predict security vulnerabilities using code complexity metrics
Complexity is often hypothesized to be the enemy of software security. If this hypothesis is true, complexity metrics may be used to predict the locale of security problems and ca...
Yonghee Shin, Laurie Williams
VIZSEC
2004
Springer
14 years 27 days ago
User re-authentication via mouse movements
We present an approach to user re-authentication based on the data collected from the computer’s mouse device. Our underlying hypothesis is that one can successfully model user ...
Maja Pusara, Carla E. Brodley
PAMI
2007
152views more  PAMI 2007»
13 years 7 months ago
DCT-Based Iris Recognition
—This paper presents a novel iris coding method based on differences of discrete cosine transform (DCT) coefficients of overlapped angular patches from normalized iris images. Th...
Donald M. Monro, Soumyadip Rakshit, Dexin Zhang
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
14 years 2 months ago
Architectural support for low overhead detection of memory violations
Violations in memory references cause tremendous loss of productivity, catastrophic mission failures, loss of privacy and security, and much more. Software mechanisms to detect me...
Saugata Ghose, Latoya Gilgeous, Polina Dudnik, Ane...