Sciweavers

2236 search results - page 267 / 448
» Intrusion detection techniques and approaches
Sort
View
ICCV
2001
IEEE
15 years 21 days ago
Blind Removal of Image Non-Linearities
This paper presents a technique for blindly removing image non-linearities in the absence of any calibration information or explicit knowledge of the imagingdevice. The basic appr...
Hany Farid, Alin C. Popescu
ICIP
2004
IEEE
15 years 11 days ago
Reduced cross-discrimination for discriminative filters
Image template detection is usually a very important halfway step for a computational vision algorithm. A recently proposed approach for it involves the use of discriminative filt...
Alexandre Pimentel Mendonça, Eduardo A. B. ...
ICIAP
2007
ACM
14 years 11 months ago
A Framework for False Positive Suppression in Video Segmentation
Object detection in video surveillance is typically done through background subtraction or temporal differencing. While these techniques perform very well under scenes where there...
Min Han Tun, Geoff A. W. West, Tele Tan
FIMI
2004
279views Data Mining» more  FIMI 2004»
14 years 5 days ago
DCI Closed: A Fast and Memory Efficient Algorithm to Mine Frequent Closed Itemsets
One of the main problems raising up in the frequent closed itemsets mining problem is the duplicate detection. In this paper we propose a general technique for promptly detecting ...
Claudio Lucchese, Salvatore Orlando, Raffaele Pere...
ICPR
2010
IEEE
13 years 8 months ago
Tracking Ships from Fast Moving Camera through Image Registration
This paper presents an algorithm that detects and tracks marine vessels in video taken by a non-stationary camera installed on an untethered buoy. 1 The video is characterized by ...
Sergiy Fefilatyev, Dmitry B. Goldgof, Chad Lembke