Sciweavers

94 search results - page 13 / 19
» Performance Forensics
Sort
View
CSDA
2007
101views more  CSDA 2007»
13 years 7 months ago
The evaluation of evidence for exponentially distributed data
At present, likelihood ratios for two-level models are determined with the use of a normal kernel estimation procedure when the between-group distribution is thought to be non-nor...
C. G. G. Aitken, Qiang Shen, Richard Jensen, B. Ha...
INTERSPEECH
2010
13 years 2 months ago
Approaching human listener accuracy with modern speaker verification
Being able to recognize people from their voice is a natural ability that we take for granted. Recent advances have shown significant improvement in automatic speaker recognition ...
Ville Hautamäki, Tomi Kinnunen, Mohaddeseh No...
INFOCOM
2005
IEEE
14 years 1 months ago
FIT: fast Internet traceback
— Traceback mechanisms are a critical part of the defense against IP spoofing and DoS attacks, as well as being of forensic value to law enforcement. Currently proposed IP trace...
Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song
ICDM
2003
IEEE
126views Data Mining» more  ICDM 2003»
14 years 24 days ago
Mining Relevant Text from Unlabelled Documents
Automatic classification of documents is an important area of research with many applications in the fields of document searching, forensics and others. Methods to perform class...
Daniel Barbará, Carlotta Domeniconi, Ning K...
KDD
2005
ACM
124views Data Mining» more  KDD 2005»
14 years 8 months ago
Scalable discovery of hidden emails from large folders
The popularity of email has triggered researchers to look for ways to help users better organize the enormous amount of information stored in their email folders. One challenge th...
Giuseppe Carenini, Raymond T. Ng, Xiaodong Zhou