Sciweavers

15351 search results - page 276 / 3071
» The information bottleneck method
Sort
View
IAT
2007
IEEE
14 years 3 months ago
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods
Phishing attack is a kind of identity theft which tries to steal confidential data like on-line bank account information. In a phishing attack scenario, attacker deceives users by...
Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bid...
IBPRIA
2007
Springer
14 years 3 months ago
A Fast and Robust Iris Segmentation Method
Image preprocessing stage (also known as iris segmentation) is the first step of the iris recognition process and determines its accuracy. In this paper, we propose a method for ir...
Noé Otero-Mateo, Miguel A. Vega-Rodrí...
ISNN
2007
Springer
14 years 3 months ago
Neural-Based Separating Method for Nonlinear Mixtures
A neural-based method for source separation in nonlinear mixture is proposed in this paper. A cost function, which consists of the mutual information and partial moments of the out...
Ying Tan
NLDB
2007
Springer
14 years 3 months ago
Developing Methods and Heuristics with Low Time Complexities for Filtering Spam Messages
In this paper, we propose methods and heuristics having high accuracies and low time complexities for filtering spam e-mails. The methods are based on the n-gram approach and a heu...
Tunga Güngör, Ali Çiltik
NORDICHI
2006
ACM
14 years 3 months ago
Modified contextual design as a field evaluation method
Downstream utility is a critical success factor for usability evaluation methods, in terms of the extent to which they can deliver value. In this paper we argue that field methods...
Sharon McDonald, Kelly Monahan, Gilbert Cockton