Sciweavers

1290 search results - page 155 / 258
» Data Dependence Testing in Practice
Sort
View
ECCV
2008
Springer
16 years 4 months ago
Cat Head Detection - How to Effectively Exploit Shape and Texture Features
In this paper, we focus on the problem of detecting the head of cat-like animals, adopting cat as a test case. We show that the performance depends crucially on how to effectively ...
Weiwei Zhang, Jian Sun, Xiaoou Tang
99
Voted
MICCAI
2006
Springer
16 years 3 months ago
Patient Position Detection for SAR Optimization in Magnetic Resonance Imaging
Although magnetic resonance imaging is considered to be non-invasive, there is at least one effect on the patient which has to be monitored: The heating which is generated by absor...
Andreas Keil, Christian Wachinger, Gerhard Brinker...
91
Voted
PAKDD
2009
ACM
72views Data Mining» more  PAKDD 2009»
15 years 9 months ago
A Multi-resolution Approach for Atypical Behaviour Mining
Atypical behaviours are the basis of a valuable knowledge in domains related to security (e.g. fraud detection for credit card [1], cyber security [4] or safety of critical systems...
Alice Marascu, Florent Masseglia
109
Voted
ICDM
2007
IEEE
182views Data Mining» more  ICDM 2007»
15 years 9 months ago
Co-ranking Authors and Documents in a Heterogeneous Network
The problem of evaluating scientific publications and their authors is important, and as such has attracted increasing attention. Recent graph-theoretic ranking approaches have d...
Ding Zhou, Sergey A. Orshanskiy, Hongyuan Zha, C. ...
105
Voted
RAID
2005
Springer
15 years 8 months ago
Environment-Sensitive Intrusion Detection
We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...