Sciweavers

21342 search results - page 4256 / 4269
» Structured language modeling
Sort
View
JCS
2010
135views more  JCS 2010»
13 years 6 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
MA
2010
Springer
153views Communications» more  MA 2010»
13 years 5 months ago
Testing quasi-independence for truncation data
Quasi-independence is a common assumption for analyzing truncated data. To verify this condition, we consider a class of weighted log-rank type statistics that include existing te...
Takeshi Emura, Weijing Wang
MM
2010
ACM
402views Multimedia» more  MM 2010»
13 years 5 months ago
Discriminative codeword selection for image representation
Bag of features (BoF) representation has attracted an increasing amount of attention in large scale image processing systems. BoF representation treats images as loose collections...
Lijun Zhang 0005, Chun Chen, Jiajun Bu, Zhengguang...
MSOM
2010
84views more  MSOM 2010»
13 years 5 months ago
Project Management Contracts with Delayed Payments
In project management, most manufacturers (project managers) offer no delayed payment contracts under which each supplier (contractor) will receive a pre-specified payment when ...
H. Dharma Kwon, Steven A. Lippman, Kevin F. McCard...
MTA
2010
175views more  MTA 2010»
13 years 5 months ago
Building a web-scale image similarity search system
As the number of digital images is growing fast and Content-based Image Retrieval (CBIR) is gaining in popularity, CBIR systems should leap towards Webscale datasets. In this paper...
Michal Batko, Fabrizio Falchi, Claudio Lucchese, D...
« Prev « First page 4256 / 4269 Last » Next »