Sciweavers

1663 search results - page 165 / 333
» Computer Security in the Real World
Sort
View
157
Voted
SDM
2009
SIAM
160views Data Mining» more  SDM 2009»
16 years 1 months ago
Discovering Substantial Distinctions among Incremental Bi-Clusters.
A fundamental task of data analysis is comprehending what distinguishes clusters found within the data. We present the problem of mining distinguishing sets which seeks to find s...
Faris Alqadah, Raj Bhatnagar
ICPR
2008
IEEE
15 years 10 months ago
Camera calibration for uneven terrains by observing pedestrians
A calibrated camera is essential for computer vision systems. The prime reason being that such a camera acts as an angle measuring device. Once the camera is calibrated, applicati...
Imran N. Junejo
ACCV
2006
Springer
15 years 7 months ago
Separation of Reflection and Transparency Using Epipolar Plane Image Analysis
The effect of reflection and transparency is superimposed in many real world scenes, which is caused by glass-like shiny and transparent materials. The presence of such incidental ...
Thanda Oo, Hiroshi Kawasaki, Yutaka Ohsawa, Katsus...
ACIVS
2009
Springer
15 years 1 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
QEST
2006
IEEE
15 years 9 months ago
Continuous Bytecode Instruction Counting for CPU Consumption Estimation
As an execution platform, the Java Virtual Machine (JVM) provides many benefits in terms of portability and security. However, this advantage turns into an obstacle when it comes...
Andrea Camesi, Jarle Hulaas, Walter Binder