Sciweavers

313 search results - page 52 / 63
» Using Recon for Data Cleaning
Sort
View
DGO
2009
88views Education» more  DGO 2009»
13 years 8 months ago
Attribute-value specification in customs fraud detection: a human-aided approach
With the growing importance of foreign commerce comes also greater opportunities for fraudulent behaviour. As such, governments must try to detect frauds as soon as they take plac...
Norton Trevisan Roman, Cristiano D. Ferreira, Luis...
SOSP
2009
ACM
14 years 4 months ago
Fabric: a platform for secure distributed computation and storage
Fabric is a new system and language for building secure distributed information systems. It is a decentralized system that allows heterogeneous network nodes to securely share bot...
Jed Liu, Michael D. George, K. Vikram, Xin Qi, Luc...
CIKM
2009
Springer
14 years 2 months ago
Mining tourist information from user-supplied collections
Tourist photographs constitute a large part of the images uploaded to photo sharing platforms. But filtering methods are needed before one can extract useful knowledge from noisy ...
Adrian Popescu, Gregory Grefenstette, Pierre-Alain...
ICPR
2008
IEEE
14 years 1 months ago
Automatic pose estimation of 3D facial models
Pose estimation plays an essential role in many computer vision applications, such as human computer interaction (HCI), driver attentiveness monitoring, face recognition, automati...
Yi Sun, Lijun Yin
PCI
2005
Springer
14 years 29 days ago
Workflow Based Security Incident Management
Security incident management is one of the critical areas that offers valuable information to security experts, but still lacks much development. Currently, several security incide...
Meletis A. Belsis, Alkis Simitsis, Stefanos Gritza...