Sciweavers

1115 search results - page 171 / 223
» Active Graph Cuts
Sort
View
APSEC
2001
IEEE
13 years 11 months ago
Tailoring and Verifying Software Process
Process tailoring and verification are very important since project-specific processes are tailored from an organizational process standard and many quality assurance activities a...
Il-Chul Yoon, Sang-Yoon Min, Doo-Hwan Bae
CEAS
2008
Springer
13 years 10 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...
CORR
2008
Springer
118views Education» more  CORR 2008»
13 years 8 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
CVPR
2009
IEEE
15 years 3 months ago
Understanding Videos, Constructing Plots - Learning a Visually Grounded Storyline Model from Annotated Videos
Analyzing videos of human activities involves not only recognizing actions (typically based on their appearances), but also determining the story/plot of the video. The storyline...
Abhinav Gupta (University of Maryland), Praveen Sr...
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
14 years 2 months ago
Three Results on Frequency Assignment in Linear Cellular Networks
In the frequency assignment problem we are given a graph representing a wireless network and a sequence of requests, where each request is associated with a vertex. Each request h...
Marek Chrobak, Jiri Sgall