Sciweavers

405 search results - page 52 / 81
» Evaluation of Anomaly Detection Method Based on Pattern Reco...
Sort
View
IBPRIA
2005
Springer
14 years 2 months ago
From Moving Edges to Moving Regions
In this paper, we propose a new method to extract moving objects from a video stream without any motion estimation. The objective is to obtain a method robust to noise, large motio...
Loic Biancardini, Eva Dokladalova, Serge Beucher, ...
EUROPAR
2000
Springer
14 years 8 days ago
Design and Evaluation of a Compiler-Directed Collective I/O Technique
Abstract. Current approaches to parallel I/O demand extensive user effort to obtain acceptable performance. This is in part due to difficulties in understanding the characteristics...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
IDEAL
2010
Springer
13 years 6 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
KDD
2008
ACM
192views Data Mining» more  KDD 2008»
14 years 9 months ago
Partial least squares regression for graph mining
Attributed graphs are increasingly more common in many application domains such as chemistry, biology and text processing. A central issue in graph mining is how to collect inform...
Hiroto Saigo, Koji Tsuda, Nicole Krämer
ECCV
2006
Springer
14 years 10 months ago
Face Recognition from Video Using the Generic Shape-Illumination Manifold
Abstract. In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical applica...
Ognjen Arandjelovic, Roberto Cipolla