Sciweavers

1621 search results - page 86 / 325
» Detecting Experiences from Weblogs
Sort
View
CVPR
2010
IEEE
14 years 2 months ago
Learning Appearance in Virtual Scenarios for Pedestrian Detection
Detecting pedestrians in images is a key functionality to avoid vehicle-to-pedestrian collisions. The most promising detectors rely on appearance-based pedestrian classifiers tra...
Francisco Marin Tur, David Vazquez, David Geronimo...
SP
2003
IEEE
107views Security Privacy» more  SP 2003»
14 years 2 months ago
Anomaly Detection Using Call Stack Information
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
JDCTA
2010
688views more  JDCTA 2010»
13 years 4 months ago
Hand Mouse: Real Time Hand Motion Detection System Based on Analysis of Finger Blobs
Hand detection is a fundamental step in many practical applications as gesture recognition, video surveillance, and multimodal machine interface and so on. The aim of this paper i...
Ibrahim Furkan Ince, Manuel Socarras-Garzon, Tae-C...
ICASSP
2011
IEEE
13 years 1 months ago
Overlapped speech detection using long-term spectro-temporal similarity in stereo recording
The problem of detecting overlapped speech in stereo recordings using close-talk microphones is important for a variety of applications including the identification of back-chann...
Bo Xiao, Prasanta Kumar Ghosh, Panayiotis G. Georg...
SAC
2010
ACM
14 years 4 months ago
Botzilla: detecting the "phoning home" of malicious software
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...