Sciweavers

350 search results - page 44 / 70
» A Component-Labeling Algorithm Using Contour Tracing Techniq...
Sort
View
ICASSP
2011
IEEE
13 years 6 days ago
Finding curves in SAR CCD images
This paper introduces a pattern recognition and computer vision approach to mitigating false alarms in synthetic aperture radar (SAR) coherence change detection (CCD) images. In t...
Miriam Cha, Rhonda Phillips, Michael Yee
SIGMETRICS
2005
ACM
127views Hardware» more  SIGMETRICS 2005»
14 years 2 months ago
A data streaming algorithm for estimating subpopulation flow size distribution
Statistical information about the flow sizes in the traffic passing through a network link helps a network operator to characterize network resource usage, infer traffic demands,...
Abhishek Kumar, Minho Sung, Jun Xu, Ellen W. Zegur...
ECCV
2004
Springer
14 years 10 months ago
A Biologically Motivated and Computationally Tractable Model of Low and Mid-Level Vision Tasks
This paper presents a biologically motivated model for low and mid-level vision tasks and its interpretation in computer vision terms. Initially we briefly present the biologically...
Iasonas Kokkinos, Rachid Deriche, Petros Maragos, ...
VIS
2007
IEEE
144views Visualization» more  VIS 2007»
14 years 9 months ago
Enhancing Depth-Perception with Flexible Volumetric Halos
Volumetric data commonly has high depth complexity which makes it difficult to judge spatial relationships accurately. There are many different ways to enhance depth perception, su...
Stefan Bruckner, M. Eduard Gröller
SP
2009
IEEE
262views Security Privacy» more  SP 2009»
14 years 3 months ago
Automatic Reverse Engineering of Malware Emulators
Malware authors have recently begun using emulation technology to obfuscate their code. They convert native malware binaries into bytecode programs written in a randomly generated...
Monirul I. Sharif, Andrea Lanzi, Jonathon T. Giffi...