Sciweavers

631 search results - page 75 / 127
» Supervised Peer-to-Peer Systems
Sort
View
VIZSEC
2004
Springer
14 years 1 months ago
User re-authentication via mouse movements
We present an approach to user re-authentication based on the data collected from the computer’s mouse device. Our underlying hypothesis is that one can successfully model user ...
Maja Pusara, Carla E. Brodley
EUROMICRO
2003
IEEE
14 years 1 months ago
Color Texture Recognition in Video Sequences using Wavelet Covariance Features and Support Vector Machines
This paper pertains to the recognition of textural regions for color video analysis. The proposed scheme uses the covariance of 2nd -order statistics on the wavelet domain, betwee...
Dimitrios K. Iakovidis, Dimitrios E. Maroulis, S. ...
ISADS
2003
IEEE
14 years 1 months ago
The Central Guardian Approach to Enforce Fault Isolation in the Time-Triggered Architecture
This paper discusses measures to make a distributed system based on the Time-Triggered Architecture resistant to arbitrary node failures. To achieve this, the presented approach i...
Günther Bauer, Hermann Kopetz, Wilfried Stein...
IRAL
2003
ACM
14 years 1 months ago
Korean named entity recognition using HMM and CoTraining model
Namedentityrecognition isimportantinsophisticatedinformation service system such as Question Answering and Text Mining since most of the answer type and text mining unit depend on...
Euisok Chung, Yi-Gyu Hwang, Myung-Gil Jang
MM
2003
ACM
84views Multimedia» more  MM 2003»
14 years 1 months ago
Temporal event clustering for digital photo collections
We present similarity-based methods to cluster digital photos by time and image content. The approach is general, unsupervised, and makes minimal assumptions regarding the structu...
Matthew L. Cooper, Jonathan Foote, Andreas Girgens...