Sciweavers

2117 search results - page 386 / 424
» A Competitive Term Selection Method for Information Retrieva...
Sort
View
157
Voted
MICCAI
2006
Springer
16 years 4 months ago
Anisotropic Feature Extraction from Endoluminal Images for Detection of Intestinal Contractions
Wireless endoscopy is a very recent and at the same time unique technique allowing to visualize and study the occurrence of contractions and to analyze the intestine motility. Feat...
Fernando Azpiroz, Fernando Vilariño, Jordi ...
125
Voted
SIGSOFT
2005
ACM
16 years 4 months ago
Arithmetic program paths
We present Arithmetic Program Paths, a novel, efficient way to compress program control-flow traces that reduces program bit traces to less than a fifth of their original size whi...
Manos Renieris, Shashank Ramaprasad, Steven P. Rei...
139
Voted
KDD
2004
ACM
330views Data Mining» more  KDD 2004»
16 years 4 months ago
Learning to detect malicious executables in the wild
In this paper, we describe the development of a fielded application for detecting malicious executables in the wild. We gathered 1971 benign and 1651 malicious executables and enc...
Jeremy Z. Kolter, Marcus A. Maloof
131
Voted
ICASSP
2009
IEEE
15 years 10 months ago
ViBE: A powerful random technique to estimate the background in video sequences
Background subtraction is a crucial step in many automatic video content analysis applications. While numerous acceptable techniques have been proposed so far for background extra...
Olivier Barnich, Marc Van Droogenbroeck
133
Voted
ICRA
2009
IEEE
121views Robotics» more  ICRA 2009»
15 years 10 months ago
Learning sequential visual attention control through dynamic state space discretization
² Similar to humans and primates, artificial creatures like robots are limited in terms of allocation of their resources to huge sensory and perceptual information. Serial process...
Ali Borji, Majid Nili Ahmadabadi, Babak Nadjar Ara...