Sciweavers

1437 search results - page 115 / 288
» Content Extraction Signatures
Sort
View
109
Voted
ICCV
2003
IEEE
16 years 4 months ago
A New Paradigm for Recognizing 3-D Object Shapes from Range Data
Most of the work on 3-D object recognition from range data has used an alignment-verification approach in which a specific 3-D object is matched to an exact instance of the same o...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
136
Voted
ICIP
2005
IEEE
16 years 4 months ago
Pedestrian classification from moving platforms using cyclic motion pattern
This paper describes an efficient pedestrian detection system for videos acquired from moving platforms. Given a detected and tracked object as a sequence of images within a bound...
Yang Ran, Qinfen Zheng, Isaac Weiss, Larry S. Davi...
ICASSP
2009
IEEE
15 years 9 months ago
Generalized mutual interdependence analysis
The mean of a data set is one trivial representation of data from one class. Recently, mutual interdependence analysis (MIA) has been successfully used to extract more involved re...
Heiko Claussen, Justinian Rosca, Robert I. Damper
140
Voted
ICAC
2006
IEEE
15 years 8 months ago
Fast and Effective Worm Fingerprinting via Machine Learning
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
134
Voted
ACSAC
2004
IEEE
15 years 6 months ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...