Sciweavers

664 search results - page 84 / 133
» A Boosting Based Approach for Automatic Micro-calcification ...
Sort
View
CN
2004
106views more  CN 2004»
13 years 8 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
SSIAI
2000
IEEE
14 years 1 months ago
Towards Knowledge-Based Extraction of Roads from 1m-Resolution Satellite Images
As IKONOS satellite with 1m-resolution camera has been launched in 1999, mapping using space-borne images will be a hot issue in computer vision area as well as photogrammetry, ma...
Hae-Yeoun Lee, Heung-Kyu Lee, Tak-gon Kim, Wonkyu ...
PADL
2010
Springer
14 years 5 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
NAACL
2004
13 years 10 months ago
A Statistical Model for Multilingual Entity Detection and Tracking
Entity detection and tracking is a relatively new addition to the repertoire of natural language tasks. In this paper, we present a statistical language-independent framework for ...
Radu Florian, Hany Hassan, Abraham Ittycheriah, Ho...
ICIP
2008
IEEE
14 years 10 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...