Sciweavers

480 search results - page 42 / 96
» A practical bottleneck detection method
Sort
View
ICDCS
2005
IEEE
14 years 3 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
PAMI
2012
12 years 18 days ago
Quantifying and Transferring Contextual Information in Object Detection
— Context is critical for reducing the uncertainty in object detection. However, context modelling is challenging because there are often many different types of contextual infor...
Wei-Shi Zheng, Shaogang Gong, Tao Xiang
KBSE
2009
IEEE
14 years 4 months ago
Alattin: Mining Alternative Patterns for Detecting Neglected Conditions
—To improve software quality, static or dynamic verification tools accept programming rules as input and detect their violations in software as defects. As these programming rul...
Suresh Thummalapenta, Tao Xie
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 2 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
TMM
2010
115views Management» more  TMM 2010»
13 years 4 months ago
Representations of Keypoint-Based Semantic Concept Detection: A Comprehensive Study
Based on the local keypoints extracted as salient image patches, an image can be described as a "bag-of-visualwords (BoW)" and this representation has appeared promising ...
Yu-Gang Jiang, Jun Yang 0003, Chong-Wah Ngo, Alexa...