Sciweavers

5435 search results - page 89 / 1087
» Informed Detection Revisited
Sort
View
PAMI
2008
157views more  PAMI 2008»
15 years 4 months ago
Globally Optimal Grouping for Symmetric Closed Boundaries by Combining Boundary and Region Information
Many natural and man-made structures have a boundary that shows a certain level of bilateral symmetry, a property that plays an important role in both human and computer vision. In...
Joachim S. Stahl, Song Wang
DSS
2000
107views more  DSS 2000»
15 years 3 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...
ICIAP
2007
ACM
15 years 10 months ago
Image Spam Filtering Using Visual Information
We address the problem of recognizing the so-called image spam, which consists in embedding the spam message into attached images to defeat techniques based on the analysis of e-m...
Battista Biggio, Giorgio Fumera, Ignazio Pillai, F...
DISCEX
2003
IEEE
15 years 9 months ago
Detecting Novel Scans Through Pattern Anomaly Detection
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Alfonso Valdes
129
Voted
IJEIS
2010
80views more  IJEIS 2010»
15 years 1 months ago
Semantics for Accurate Conflict Detection in SMoVer: Specification, Detection and Presentation by Example
In collaborative software development the utilization of Version Control Systems (VCSs) is a must. For this, a multitude of pessimistic as well as optimistic VCSs for model artifa...
Kerstin Altmanninger, Wieland Schwinger, Gabriele ...