Sciweavers

166 search results - page 28 / 34
» An efficient and robust method for detecting copy-move forge...
Sort
View
CIRA
2007
IEEE
274views Robotics» more  CIRA 2007»
14 years 1 months ago
Adaptive Object Tracking using Particle Swarm Optimization
—This paper presents an automatic object detection and tracking algorithm by using particle swarm optimization (PSO) based method, which is a searching algorithm inspired by the ...
Yuhua Zheng, Yan Meng
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
14 years 7 months ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
SIGSOFT
2003
ACM
14 years 7 months ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler
ECCV
2006
Springer
13 years 10 months ago
SIFT and Shape Context for Feature-Based Nonlinear Registration of Thoracic CT Images
Nonlinear image registration is a prerequisite for various medical image analysis applications. Many data acquisition protocols suffer from problems due to breathing motion which h...
Martin Urschler, Joachim Bauer, Hendrik Ditt, Hors...
ACL
2001
13 years 8 months ago
Japanese Named Entity Recognition based on a Simple Rule Generator and Decision Tree Learning
Named entity (NE) recognition is a task in which proper nouns and numerical information in a document are detected and classified into categories such as person, organization, loc...
Hideki Isozaki