Sciweavers

1877 search results - page 108 / 376
» A new method for bottleneck detection
Sort
View
WSCG
2004
487views more  WSCG 2004»
13 years 10 months ago
Visitor Identification - Elaborating Real Time Face Recognition System
In this paper requirements and conditions for the visitor identification system are outlined and an example system is proposed. Two main subsystems: face detection and face recogn...
Georgy Kukharev, Adam Nowosielski
KDD
2005
ACM
104views Data Mining» more  KDD 2005»
14 years 9 months ago
A hit-miss model for duplicate detection in the WHO drug safety database
The WHO Collaborating Centre for International Drug Monitoring in Uppsala, Sweden, maintains and analyses the world's largest database of reports on suspected adverse drug re...
Andrew Bate, G. Niklas Norén, Roland Orre
MICCAI
2004
Springer
14 years 10 months ago
Interface Detection in Diffusion Tensor MRI
We present a new method for detecting the interface, or edge, structure present in diffusion MRI. Interface detection is an important first step for applications including segmenta...
Lauren O'Donnell, W. Eric L. Grimson, Carl-Fredrik...
FIW
1998
130views Communications» more  FIW 1998»
13 years 10 months ago
A Heuristic Approach to Detect Feature Interactions in Requirements
We present a method to systematically detect feature interactions in requirements, which are expressed as constraints on system event traces. We show its application on the lift sy...
Maritta Heisel, Jeanine Souquières
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 2 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...