Sciweavers

603 search results - page 18 / 121
» Efficient neighborhood-based computations on regions using s...
Sort
View
DSN
2005
IEEE
14 years 2 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
CVPR
2009
IEEE
14 years 3 months ago
Sigma Set: A small second order statistical region descriptor
Given an image region of pixels, second order statistics can be used to construct a descriptor for object representation. One example is the covariance matrix descriptor, which sh...
Xiaopeng Hong, Hong Chang, Shiguang Shan, Xilin Ch...
AINA
2007
IEEE
14 years 14 days ago
Uniformity and Efficiency of a Wireless Sensor Network's Coverage
Abstract-- The primary contribution of this paper is in a wireless sensor network's coverage analysis method, which focuses on both the coverage itself and its uniformity and ...
Md. Ashiqur Rahman, Sajid Hussain
ICIP
2010
IEEE
13 years 5 months ago
Saliency detection using maximum symmetric surround
Detection of visually salient image regions is useful for applications like object segmentation, adaptive compression, and object recognition. Recently, full-resolution salient ma...
Radhakrishna Achanta, Sabine Süsstrunk
SGP
2004
13 years 11 months ago
Shape Segmentation Using Local Slippage Analysis
We propose a method for segmentation of 3D scanned shapes into simple geometric parts. Given an input point cloud, our method computes a set of components which possess one or mor...
Natasha Gelfand, Leonidas J. Guibas