Sciweavers

284 search results - page 53 / 57
» An Efficient Automatic Redeye Detection and Correction Algor...
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
BMCBI
2010
191views more  BMCBI 2010»
13 years 7 months ago
Colonyzer: automated quantification of micro-organism growth characteristics on solid agar
Background: High-throughput screens comparing growth rates of arrays of distinct micro-organism cultures on solid agar are useful, rapid methods of quantifying genetic interaction...
Conor Lawless, Darren J. Wilkinson, Alexander Youn...
SIGMOD
1999
ACM
183views Database» more  SIGMOD 1999»
13 years 12 months ago
OPTICS: Ordering Points To Identify the Clustering Structure
Cluster analysis is a primary method for database mining. It is either used as a stand-alone tool to get insight into the distribution of a data set, e.g. to focus further analysi...
Mihael Ankerst, Markus M. Breunig, Hans-Peter Krie...
ISM
2008
IEEE
140views Multimedia» more  ISM 2008»
14 years 1 months ago
Medical Video Event Classification Using Shared Features
Advances in video technology are being incorporated into today’s medical research and education. Medical videos contain important medical events, such as diagnostic or therapeut...
Yu Cao, Shih-Hsi Liu, Ming Li, Sung Baang, Sanqing...
ACCV
2010
Springer
13 years 10 months ago
Identifying Surprising Events in Videos Using Bayesian Topic Models
Automatic processing of video data is essential in order to allow efficient access to large amounts of video content, a crucial point in such applications as video mining and surve...
Avishai Hendel, Daphna Weinshall, Shmuel Peleg