Sciweavers

1805 search results - page 265 / 361
» Computationally Efficient Face Detection
Sort
View
144
Voted
GI
2009
Springer
15 years 1 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
131
Voted
ICPR
2006
IEEE
16 years 4 months ago
A New Approach to Automated Retinal Vessel Segmentation Using Multiscale Analysis
Computer based analysis for automated segmentation of blood vessels in retinal images will help eye care specialists screen larger populations for vessel abnormalities. However, a...
Qin Li, Lei Zhang, David Zhang, Prabir Bhattachary...
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 7 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
CVPR
2005
IEEE
16 years 5 months ago
Multitarget Tracking with Split and Merged Measurements
In many multitarget tracking applications in computer vision, a detection algorithm provides locations of potential targets. Subsequently, the measurements are associated with pre...
Zia Khan, Tucker R. Balch, Frank Dellaert
148
Voted
ICIP
2006
IEEE
16 years 5 months ago
Two-Stage Optimal Component Analysis
Linear techniques are widely used to reduce the dimension of image representation spaces in applications such as image indexing and object recognition. Optimal Component Analysis ...
Yiming Wu, Xiuwen Liu, Washington Mio, Kyle A. Gal...