Sciweavers

664 search results - page 120 / 133
» A Boosting Based Approach for Automatic Micro-calcification ...
Sort
View
MM
2005
ACM
178views Multimedia» more  MM 2005»
14 years 2 months ago
Attention region selection with information from professional digital camera
The attentive region extraction is a challenging issue for semantic interpretation of image and video content. The successful attentive region extraction greatly facilitates image...
Song Liu, Liang-Tien Chia, Deepu Rajan
ICASSP
2008
IEEE
14 years 3 months ago
Effective error prediction using decision tree for ASR grammar network in call system
CALL (Computer Assisted Language Learning) systems using ASR (Automatic Speech Recognition) for second language learning have received increasing interest recently. However, it st...
Hongcui Wang, Tatsuya Kawahara
CSFW
2007
IEEE
14 years 3 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
ICCAD
2007
IEEE
102views Hardware» more  ICCAD 2007»
14 years 5 months ago
Scalable exploration of functional dependency by interpolation and incremental SAT solving
Functional dependency is concerned with rewriting a Boolean function f as a function h over a set of base functions {g1, …, gn}, i.e. f = h(g1, …, gn). It plays an important r...
Chih-Chun Lee, Jie-Hong Roland Jiang, Chung-Yang H...
SIGCOMM
2003
ACM
14 years 2 months ago
A framework for classifying denial of service attacks
Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...