Sciweavers

571 search results - page 20 / 115
» Matching Algorithms within a Duplicate Detection System
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
PhishNet: Predictive Blacklisting to Detect Phishing Attacks
—Phishing has been easy and effective way for trickery and deception on the Internet. While solutions such as URL blacklisting have been effective to some degree, their reliance ...
Pawan Prakash, Manish Kumar, Ramana Rao Kompella, ...
CIVR
2007
Springer
247views Image Analysis» more  CIVR 2007»
14 years 2 months ago
Near-duplicate keyframe retrieval with visual keywords and semantic context
Near-duplicate keyframes (NDK) play a unique role in large-scale video search, news topic detection and tracking. In this paper, we propose a novel NDK retrieval approach by explo...
Xiao Wu, Wanlei Zhao, Chong-Wah Ngo
ESE
2008
112views Database» more  ESE 2008»
13 years 8 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
CIKM
2007
Springer
14 years 2 months ago
Leveraging context in user-centric entity detection systems
A user-centric entity detection system is one in which the primary consumer of the detected entities is a person who can perform actions on the detected entities (e.g. perform a s...
Vadim von Brzeski, Utku Irmak, Reiner Kraft
NIPS
2008
13 years 10 months ago
Adaptive Template Matching with Shift-Invariant Semi-NMF
How does one extract unknown but stereotypical events that are linearly superimposed within a signal with variable latencies and variable amplitudes? One could think of using temp...
Jonathan Le Roux, Alain de Cheveigné, Lucas...