Sciweavers

209 search results - page 34 / 42
» Learning from defect removals
Sort
View
HICSS
1998
IEEE
176views Biometrics» more  HICSS 1998»
13 years 12 months ago
Intelligent System for Reading Handwriting on Forms
The National Institute of Standards and Technology (NIST) has developed a form-based handprint recognition system for reading information written on forms. This public domain soft...
Michael D. Garris
PRL
2006
148views more  PRL 2006»
13 years 7 months ago
An agent based evolutionary approach to path detection for off-road vehicle guidance
This paper describes an ant colony optimization approach adopted to decide on road-borders to automatically guide a vehicle developed for the DARPA Grand Challenge 2004, available...
Alberto Broggi, Stefano Cattani
MM
2009
ACM
260views Multimedia» more  MM 2009»
14 years 2 months ago
Web image mining towards universal age estimator
In this paper, we present an automatic web image mining system towards building a universal human age estimator based on facial information, which is applicable to all ethnic grou...
Bingbing Ni, Zheng Song, Shuicheng Yan
EDM
2008
97views Data Mining» more  EDM 2008»
13 years 9 months ago
Using Item-type Performance Covariance to Improve the Skill Model of an Existing Tutor
Using data from an existing pre-algebra computer-based tutor, we analyzed the covariance of item-types with the goal of describing a more effective way to assign skill labels to it...
Philip I. Pavlik, Hao Cen, Lili Wu, Kenneth R. Koe...
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 11 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore