Sciweavers

1216 search results - page 168 / 244
» Anomaly Detection Using an Ensemble of Feature Models
Sort
View
ICPR
2006
IEEE
14 years 9 months ago
Finding Text in Natural Scenes by Figure-Ground Segmentation
Much past research on finding text in natural scenes uses bottom-up grouping processes to detect candidate text features as a first processing step. While such grouping procedures...
Huiying Shen, James Coughlan
VALUETOOLS
2006
ACM
167views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Detailed cache simulation for detecting bottleneck, miss reason and optimization potentialities
Cache locality optimization is an efficient way for reducing the idle time of modern processors in waiting for needed data. This kind of optimization can be achieved either on the...
Jie Tao, Wolfgang Karl
3DIM
2003
IEEE
13 years 11 months ago
Automatic Model Refinement for 3D Reconstruction with Mobile Robots
Precise digital 3D models of indoor environments are needed in several applications, e.g., facility management, architecture, rescue and inspection robotics. This paper presents a...
Andreas Nüchter, Hartmut Surmann, Joachim Her...
ITIIS
2010
131views more  ITIIS 2010»
13 years 6 months ago
The Analysis of Random Propagating Worms using Network Bandwidth
There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model ...
Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young...
IJCAI
2003
13 years 9 months ago
ODISET: On-line Distributed Session Tracing using Agents
When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Salvador Mandujano, Arturo Galván