參考文獻 |
[1] I. Androutsopoulos, et. al., "An Evaluation of Naive Bayesian Anti-Spam Filtering," in Proc. of the Workshop on Machine Learning in the New Information Age, 11th European Conference on Machine Learning (ECML 2000), pp. 9-17, May 2000.
[2] Arentz, W.A. and Olstad, B., "Classifying offensive sites based on image content", Computer Vision and Image Understanding Journal, No. 1-3, April-June 2004, pp. 295-310.
[3] Bosson, A. and Cawley, G.C. and Chan, Y. and Harvey, R.W., "Non-retrieval: blocking pornographic images", In International Conference on Image and Video Retrieval CIVR-2002, pp. 50-60, 2002
[4] Vittorio Castelli , Lawrence D. Bergman., “Image Databases: Search and Retrieval of Digital Imagery”, 2001
[5] Chan, Y., Harvey, R., Smith, D. ”Building systems to block pornography.” Challenge of Image Retrieval, BCS Electronic Workshops in Computing series (1999) 34—40
[6] Patrick S. Che, “An Automatic System for Collecting Crime Information on the Internet,” Journal of Information, Law and Technology
[7] P.E. Danielson. “Euclidean distance mapping.” Computer Graphics and Image Processing, 13:3:227-248, November 1980
[8] Rongbo Du, Reihaneh Safavi-Naini and Willy Susilo, “Web Filtering Using Text Classification”, 2004
[9] M.M. Fleck, D.A. Forsyth and C. Bregler, “Finding naked people,” Proc. European Conf. on Computer Vision , 1996.
[10] Fleck, Margaret M., 1996, “Practical Edge Finding with a robust estimator,” Proc. of the IEEE Conf. on Computer Vision and Pattern Recognition, pp.649-653
[11] Gary Vanderet, “An Affair of the Mind”, http://www.pbcc.org/sermons/vanderet /1089.pdf ,1997
[12] Th. Gevers, F. Aldershoff, and A. W. M. Smeulders, Classification of Images on Internet by Visual and Textual Information, Internet Imaging, SPIE, San Jose,January, 2000.
[13] Gibson, S. and Harvey, R.W., "Analysing and simplifying histograms using scale-trees", In Proceedings of 11th International Conference on Image Analysis and Processing, Palermo, Italy, 2001
[14] Haddon, J. and Forsyth, D. A. ``Shape representations from shading primitives' 5th European Conference on Computer Vision, Proceedings p.415-31 vol.2., 1998
[15] X. He, H. Zha, C. H. Q. Ding, and H. D. Simon. Web document clustering using hyperlink structures. Computational Statistics & Data Analysis, 41(1):19--45, November 2002.
[16] Hooman Katirai, "Filtering Junk E-Mail: A Performance Comparison between Genetic Programming & Naive Bayes," available online at: http://members.rogers.com/hoomank/katirai99filtering.pdf, Sep. 1999.
[17] R. L. Hsu, M. A. Mottaleb, and A. K. Jain, “Face detection in color images,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 24, no. 5, pp. 696-706, May 2002.
[18] Lee P.Y, Hui S.C., Fong A.C.M., ”Neural networks for web content filtering ,” IEEE Intelligent Systems, Volume: 17, pp. 48 -57,2002
[19] Feng Jiao, Lijuan, Wen Gao, Guoqin Cui. “Detecting Adult Image Using Multiple Features”,ICII 2001: International Conferences on Info-tech & Info-net Oct. 2001(B-024), Beijing,China
[20] S. Paek, C. L. Sable, V. Hatzivassiloglou, A. Jaimes, B. H. Schiffman, S.-F. Chang, K. R. McKeown, “Integration of Visual and Text Based Approaches for the Content Labeling and Classification of Photographs”, ACM SIGIR'99 Workshop on Multimedia Indexing and Retrieval, Berkeley, CA, August 19, 1999.
[21] Rafael C Gonzalez, Richard E. Woods., “Digital Image Processing”
[22] Rongbo Du, Reihaneh Safavi-Naimi, and Willy Susilo, “Web Filtering Using Text Classification”
[23] R. Schettini, G. Ciocca, and S. Zuffi. “A survey of methods for colour image indexing and retrieval inimage databases.”, Color Imaging Science: Exploiting Digital Media.John Wiley, 2001
[24] R. Schettini, C. Brambilla, C. Cusano, G. Ciocca., “On the detection of pornographic digital images”
[25] Shi, J., Malik, J., 1997. Normalized cuts and image segmentation. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, June. pp. 731–737.
[26] M. C. Shin, K. I. Chang and L. V. Tsap, "Does Colorspace Transformation Make Any Difference on Skin Detection?", IEEE Workshop on Applications of Computer Vision, pages 275-279, Orlando, FL, December 2002
[27] Simmons, M., Sequin,C. H.: “2D Shape Decomposition and the Automatic Generation of Hierarchical Representations”. International Journal of Shape Modeling 4 (1998) 63--78.
[28] Smith, D.J. and Harvey, R.W. and Chan, Y. and Bangham, J. A., "Classifying web pages by content", In IEE European Workshop on Distributed Imaging, vol. 99/109, pp. 8/1-8/7, 1999, Reference No.:1999/109
[29] James Z. Wang, Jia Li, Gio Wiederhold and Oscar Firschein, ``System for Screening Objectionable Images, Using Daubechies’ Wavelets and Color Histograms' Computer Communications, vol. 21, no. 15, pp. 1355-1360, Elsevier, 1998
[30] Richardson C. R, Resnick P. J, Hansen D. L. “Does pornography-blocking software block access to health information on the internet?” JAMA. 2002;288:2887-2894.
[31] Ruo Zhang , Ping-Sing Tsai , James Edwin Cryer , Mubarak Shah, “Shape from Shading: A Survey”, IEEE Transactions on Pattern Analysis and Machine Intelligence, v.21 n.8, p.690-706, August 1999
[32] http://kids.yam.com/
[33] Recreational Software Advisory Council, http://www.rsac.org
[34] Squid Guard, http://www.squidguard.org
[35] SafeSurf, http://www.safesurf.com/
[36] http://www.w3.org/PICS/
[37] http://www.net-protect.org/
[38] http://www.saferinternet.org/
[39] http://yahooligans.yahoo.com/
[40] 郭廖軒,“以網域名稱伺服器為基礎之色情網站過濾系統“,國立中央大學資訊工程學系,民92
[41] 林維德,“色情網頁之偵測與蒐集,國立成功大學資訊工程研究所,民90
[42] 視覺素描研究所,”藝用解剖學”,藝術圖書公司,民76
[43] 魏道慧,”人體結構與藝術構成”,民81
[44] Lawrence Lessig, CODE and Othre Laws of Cyberspace. 劉靜宜譯(2002):《網路自由與法律》。台北:商周出版。
[45] http://ir.csie.ncku.edu.tw/Project/researchAchievement3.htm,台灣學術網路上不當資訊防制及搜尋機制 |