Sciweavers

912 search results - page 58 / 183
» Anomaly
Sort
View
CVPR
1998
IEEE
14 years 10 months ago
Anomaly Detection through Registration
We study an application of image registration in the medical domain. Based on a 3-D hierarchical deformable registration algorithm, we developed a prototype for automatic register...
Mei Chen, Takeo Kanade, Henry A. Rowley, Dean Pome...
CVPR
2008
IEEE
14 years 10 months ago
Probabilistic image registration and anomaly detection by nonlinear warping
Automatic, defect tolerant registration of transmission electron microscopy (TEM) images poses an important and challenging problem for biomedical image analysis, e.g. in computat...
Verena Kaynig, Bernd Fischer, Joachim M. Buhmann
ICML
2003
IEEE
14 years 9 months ago
Bayesian Network Anomaly Pattern Detection for Disease Outbreaks
Weng-Keen Wong, Andrew W. Moore, Gregory F. Cooper...
KDD
2009
ACM
151views Data Mining» more  KDD 2009»
14 years 9 months ago
A LRT framework for fast spatial anomaly detection
Given a spatial data set placed on an n ? n grid, our goal is to find the rectangular regions within which subsets of the data set exhibit anomalous behavior. We develop algorithm...
Mingxi Wu, Xiuyao Song, Chris Jermaine, Sanjay Ran...
SIGMOD
2004
ACM
103views Database» more  SIGMOD 2004»
14 years 9 months ago
A Read-Only Transaction Anomaly Under Snapshot Isolation
Snapshot Isolation (SI), is a multi-version concurrency control algorithm introduced in [BBGMOO95] and later implemented by Oracle. SI avoids many concurrency errors, and it never ...
Alan Fekete, Elizabeth J. O'Neil, Patrick E. O'Nei...