Sciweavers

1290 search results - page 155 / 258
» Data Dependence Testing in Practice
Sort
View
ECCV
2008
Springer
14 years 12 months ago
Cat Head Detection - How to Effectively Exploit Shape and Texture Features
In this paper, we focus on the problem of detecting the head of cat-like animals, adopting cat as a test case. We show that the performance depends crucially on how to effectively ...
Weiwei Zhang, Jian Sun, Xiaoou Tang
MICCAI
2006
Springer
14 years 11 months ago
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
Although magnetic resonance imaging is considered to be non-invasive, there is at least one effect on the patient which has to be monitored: The heating which is generated by absor...
Andreas Keil, Christian Wachinger, Gerhard Brinker...
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
14 years 4 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
14 years 4 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
RAID
2005
Springer
14 years 3 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...