Sciweavers

285 search results - page 40 / 57
» Systematic evaluation of e-learning systems: an experimental...
Sort
View
IMC
2009
ACM
14 years 2 months ago
Geolocalization of proxied services and its application to fast-flux hidden servers
Fast-flux is a redirection technique used by cyber-criminals to hide the actual location of malicious servers. Its purpose is to evade identification and prevent or, at least de...
Claude Castelluccia, Mohamed Ali Kâafar, Per...
IDA
2002
Springer
13 years 8 months ago
Boosting strategy for classification
This paper introduces a strategy for training ensemble classifiers by analysing boosting within margin theory. We present a bound on the generalisation error of ensembled classifi...
Huma Lodhi, Grigoris J. Karakoulas, John Shawe-Tay...
ICASSP
2007
IEEE
14 years 2 months ago
Exploiting Concept Association to Boost Multimedia Semantic Concept Detection
In the paper we study the efficiency of semantic concept association in multimedia semantic concept detection. We present an approach to automatically learn from the corpus the as...
Sheng Gao, Xinglei Zhu, Qibin Sun
ICRA
2009
IEEE
197views Robotics» more  ICRA 2009»
14 years 3 months ago
Synchronous EEG brain-actuated wheelchair with automated navigation
Abstract— This paper describes a new non-invasive brainactuated wheelchair that relies on a P300 neurophysiological protocol and automated navigation. In operation, the subject f...
Iñaki Iturrate, Javier M. Antelis, Javier M...
ACSAC
2010
IEEE
13 years 6 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...