Sciweavers

1115 search results - page 171 / 223
» Active Graph Cuts
Sort
View
APSEC
2001
IEEE
15 years 6 months ago
Tailoring and Verifying Software Process
Process tailoring and verification are very important since project-specific processes are tailored from an organizational process standard and many quality assurance activities a...
Il-Chul Yoon, Sang-Yoon Min, Doo-Hwan Bae
CEAS
2008
Springer
15 years 4 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...
CORR
2008
Springer
118views Education» more  CORR 2008»
15 years 2 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
CVPR
2009
IEEE
16 years 9 months ago
Understanding Videos, Constructing Plots - Learning a Visually Grounded Storyline Model from Annotated Videos
Analyzing videos of human activities involves not only recognizing actions (typically based on their appearances), but also determining the story/plot of the video. The storyline...
Abhinav Gupta (University of Maryland), Praveen Sr...
118
Voted
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
15 years 9 months ago
Three Results on Frequency Assignment in Linear Cellular Networks
In the frequency assignment problem we are given a graph representing a wireless network and a sequence of requests, where each request is associated with a vertex. Each request h...
Marek Chrobak, Jiri Sgall