Sciweavers

2236 search results - page 284 / 448
» Intrusion detection techniques and approaches
Sort
View
PR
2002
129views more  PR 2002»
13 years 10 months ago
Text extraction in complex color documents
Text extraction in mixed-type documents is a pre-processing and necessary stage for many document applications. In mixed-type color documents, text, drawings and graphics appear w...
Charalambos Strouthopoulos, Nikos Papamarkos, Anto...
GI
2010
Springer
13 years 8 months ago
Elicitation of Preferences for Web Service Compositions
Abstract: Preference elicitation is often used in e-services to create product recommendations for their customers. We present an approach for applying preference elicitation techn...
Carolin Michels, Sudhir Agarwal
CVPR
1998
IEEE
15 years 20 days ago
Texture Recognition Using a Non-Parametric Multi-Scale Statistical Model
We describe a technique for using the joint occurrence of local features at multiple resolutions to measure the similarity between texture images. Though superficially similar to ...
Jeremy S. De Bonet, Paul A. Viola
ICCV
2007
IEEE
15 years 18 days ago
Efficient Mining of Frequent and Distinctive Feature Configurations
We present a novel approach to automatically find spatial configurations of local features occurring frequently on instances of a given object class, and rarely on the background....
Till Quack, Vittorio Ferrari, Bastian Leibe, Luc J...
SEMWEB
2007
Springer
14 years 4 months ago
Scalable Cleanup of Information Extraction Data Using Ontologies
Abstract. The approach of using ontology reasoning to cleanse the output of information extraction tools was first articulated in SemantiClean. A limiting factor in applying this ...
Julian Dolby, James Fan, Achille Fokoue, Aditya Ka...