Sciweavers

119 search results - page 10 / 24
» Applying Computer Vision Techniques to Traffic Monitoring Ta...
Sort
View
ICDM
2007
IEEE
145views Data Mining» more  ICDM 2007»
14 years 1 months ago
Using Data Mining to Estimate Missing Sensor Data
Estimating missing sensor values is an inherent problem in sensor network applications; however, existing data estimation approaches do not apply well to the context of datastream...
Le Gruenwald, Hamed Chok, Mazen Aboukhamis
RAID
2010
Springer
13 years 6 months ago
Hybrid Analysis and Control of Malware
Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
Kevin A. Roundy, Barton P. Miller
ICCV
2007
IEEE
14 years 9 months ago
A Study of Face Recognition as People Age
In this paper we study face recognition across ages within a real passport photo verification task. First, we propose using the gradient orientation pyramid for this task. Discard...
Haibin Ling, Stefano Soatto, Narayanan Ramanathan,...
CVPR
2000
IEEE
14 years 9 months ago
Agent-Based Moving Object Correspondence Using Differential Discriminative Diagnosis
We propose a novel method for temporally and spatially corresponding moving objects by automatically learning the relevance of the objects' appearance features to the task of...
Mahesh Saptharishi, John B. Hampshire II, Pradeep ...
ICPR
2008
IEEE
14 years 2 months ago
Unsupervised writer style adaptation for handwritten word spotting
We propose a novel approach for writer adaptation in a word spotting task. The method exploits the fact that a semi-continuous hidden Markov model separates the word model paramet...
José A. Rodríguez, Florent Perronnin...