Sciweavers

257 search results - page 26 / 52
» Automatic red-eye detection and correction
Sort
View
ISBI
2011
IEEE
13 years 13 days ago
Interventional MR-imaging for thermal ablation therapy
Magnetic Resonance Imaging (MRI) has several unique advantages for guiding thermal ablation therapies. It not only provides excellent soft-tissue contrast and multiplanar capabili...
Eva Rothgang, Wesley D. Gilson, Wilhelm Strehl, Li...
MMM
2012
Springer
324views Multimedia» more  MMM 2012»
12 years 4 months ago
Sensor-Based Analysis of User Generated Video for Multi-camera Video Remixing
In this work we propose to exploit context sensor data for analyzing user generated videos. Firstly, we perform a low-level indexing of the recorded media with the instantaneous co...
Francesco Cricri, Igor D. D. Curcio, Sujeet Mate, ...
SAC
2008
ACM
13 years 7 months ago
ICER: a tool for finding errors in a UML model
Detecting errors in an early phase of software development can help to reduce the cost of software systems. Many research attempts presented a fixed set of rules to help finding e...
Wuwei Shen, Dae-Kyoo Kim
SIGMOD
2004
ACM
184views Database» more  SIGMOD 2004»
14 years 9 months ago
CORDS: Automatic Discovery of Correlations and Soft Functional Dependencies
The rich dependency structure found in the columns of real-world relational databases can be exploited to great advantage, but can also cause query optimizers--which usually assum...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul B...
ACSAC
2006
IEEE
14 years 2 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh