Sciweavers

101 search results - page 13 / 21
» Detecting Regular Visit Patterns
Sort
View
ICCV
2005
IEEE
14 years 10 months ago
Detecting Irregularities in Images and in Video
We address the problem of detecting irregularities in visual data, e.g., detecting suspicious behaviors in video sequences, or identifying salient patterns in images. The term &qu...
Oren Boiman, Michal Irani
SEKE
2010
Springer
13 years 7 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
CLEF
2010
Springer
13 years 9 months ago
Wiki Vandalysis - Wikipedia Vandalism Analysis - Lab Report for PAN at CLEF 2010
Wikipedia describes itself as the "free encyclopedia that anyone can edit". Along with the helpful volunteers who contribute by improving the articles, a great number of ...
Manoj Harpalani, Thanadit Phumprao, Megha Bassi, M...
KDD
2007
ACM
220views Data Mining» more  KDD 2007»
14 years 9 months ago
SCAN: a structural clustering algorithm for networks
Network clustering (or graph partitioning) is an important task for the discovery of underlying structures in networks. Many algorithms find clusters by maximizing the number of i...
Xiaowei Xu, Nurcan Yuruk, Zhidan Feng, Thomas A. J...
CVPR
2001
IEEE
14 years 10 months ago
Texture Replacement in Real Images
Texture replacement in real images has many applications, such as interior design, digital movie making and computer graphics. The goal is to replace some specified texture patter...
Yanghai Tsin, Yanxi Liu, Visvanathan Ramesh