This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system mo...
Ashkan Sharifi Shamili, Christian Bauckhage, Tansu...
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
The design of practical language applications by means of statistical approaches requires annotated data, which is one of the most critical constraint. This is particularly true f...
Marco Dinarelli, Alessandro Moschitti, Giuseppe Ri...
We observed that for multimedia data – especially music - collaborative similarity measures perform much better than similarity measures derived from content-based sound feature...
We present a component-based method and two global methods for face recognition and evaluate them with respect to robustness against pose changes. In the component system we first...