Sciweavers

125 search results - page 8 / 25
» Online Feature Selection using Grafting
Sort
View
137
Voted
CORR
2010
Springer
286views Education» more  CORR 2010»
15 years 4 days ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
CVPR
2007
IEEE
16 years 5 months ago
Learning Features for Tracking
We treat tracking as a matching problem of detected keypoints between successive frames. The novelty of this paper is to learn classifier-based keypoint descriptions allowing to i...
Michael Grabner, Helmut Grabner, Horst Bischof
150
Voted
ICFHR
2010
155views Biometrics» more  ICFHR 2010»
14 years 10 months ago
A Hybrid Model for Recognition of Online Handwriting in Indian Scripts
We present a complete online handwritten character recognition system for Indian languages that handles the ambiguities in segmentation as well as recognition of the strokes. The ...
Amit Arora, Anoop M. Namboodiri
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
16 years 4 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang
ICPR
2008
IEEE
15 years 9 months ago
A network intrusion detection method using independent component analysis
An intrusion detection system (IDS) detects illegal manipulations of computer systems. In intrusion detection systems, feature reduction, including feature extraction and feature ...
Dayu Yang, Hairong Qi