Sciweavers

996 search results - page 185 / 200
» Component-based Face Detection
Sort
View
BMVC
2010
13 years 9 months ago
High Five: Recognising human interactions in TV shows
In this paper we address the problem of recognising interactions between two people in realistic scenarios for video retrieval purposes. We develop a per-person descriptor that us...
Alonso Patron, Marcin Marszalek, Andrew Zisserman,...
EMNLP
2010
13 years 9 months ago
The Necessity of Combining Adaptation Methods
Problems stemming from domain adaptation continue to plague the statistical natural language processing community. There has been continuing work trying to find general purpose al...
Ming-Wei Chang, Michael Connor, Dan Roth
RAID
2010
Springer
13 years 8 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
TMA
2010
Springer
140views Management» more  TMA 2010»
13 years 8 months ago
Uncovering Relations between Traffic Classifiers and Anomaly Detectors via Graph Theory
Abstract. Network traffic classification and anomaly detection have received much attention in the last few years. However, due to the the lack of common ground truth, proposed met...
Romain Fontugne, Pierre Borgnat, Patrice Abry, Ken...
ICDM
2009
IEEE
167views Data Mining» more  ICDM 2009»
13 years 8 months ago
Self-Adaptive Anytime Stream Clustering
Clustering streaming data requires algorithms which are capable of updating clustering results for the incoming data. As data is constantly arriving, time for processing is limited...
Philipp Kranen, Ira Assent, Corinna Baldauf, Thoma...