Sciweavers

3317 search results - page 528 / 664
» Strategies in Rigid-Variable Methods
Sort
View
SEC
2008
15 years 6 months ago
Protecting Financial Institutions from Brute-Force Attacks
We examine the problem of protecting online banking accounts from password brute-forcing attacks. Our method is to create a large number of honeypot userID-password pairs. Presenta...
Cormac Herley, Dinei A. F. Florêncio
MVA
2007
127views Computer Vision» more  MVA 2007»
15 years 6 months ago
Appearance Manifold with Embedded Covariance Matrix for Robust 3D Object Recognition
We propose use of an appearance manifold with embedded covariance matrix as a technique for recognizing 3D objects from images that are influenced by geometric and quality-degrade...
Lina, Tomokazu Takahashi, Ichiro Ide, Hiroshi Mura...
RIAO
2007
15 years 6 months ago
A Survey on XML Focussed Component Retrieval
Focussed XML component retrieval is one of the most important challenges in the XML IR field. The aim of the focussed retrieval strategy is to find the most exhaustive and specifi...
Karen Pinel-Sauvagnat, Mohand Boughanem
AAAI
2004
15 years 6 months ago
MAX-2-SAT: How Good Is Tabu Search in the Worst-Case?
Tabu search algorithms are amongst the most successful local search based methods for the maximum satisfiability problem. The practical superiority of tabu search over the local s...
Monaldo Mastrolilli, Luca Maria Gambardella
ACL
2004
15 years 6 months ago
Multi-Criteria-based Active Learning for Named Entity Recognition
In this paper, we propose a multi-criteriabased active learning approach and effectively apply it to named entity recognition. Active learning targets to minimize the human annota...
Dan Shen, Jie Zhang, Jian Su, Guodong Zhou, Chew L...