Sciweavers

2236 search results - page 286 / 448
» Intrusion detection techniques and approaches
Sort
View
CVPR
2010
IEEE
1413views Computer Vision» more  CVPR 2010»
14 years 7 months ago
Free-Shape Subwindow Search for Object Localization
Object localization in an image is usually handled by searching for an optimal subwindow that tightly covers the object of interest. However, the subwindows considered in previous ...
Zhiqi Zhang, Yu Cao, Dhaval Salvi, Kenton Oliver, ...
ISVC
2007
Springer
14 years 4 months ago
A Vision-Based Architecture for Intent Recognition
Abstract. Understanding intent is an important aspect of communication among people and is an essential component of the human cognitive system. This capability is particularly rel...
Alireza Tavakkoli, Richard Kelley, Christopher Kin...
IEEEPACT
1999
IEEE
14 years 2 months ago
Containers on the Parallelization of General-Purpose Java Programs
Automatic parallelization of general-purpose programs is still not possible in general in the presence of irregular data structures and complex control-flows. One promising strate...
Peng Wu, David A. Padua
ICCV
1995
IEEE
14 years 2 months ago
Geodesic Active Contours
A novel scheme for the detection of object boundaries is presented. The technique is based on active contours evolving in time according to intrinsic geometric measures of the imag...
Vicent Caselles, Ron Kimmel, Guillermo Sapiro
DIMVA
2007
14 years 3 days ago
A Study of Malcode-Bearing Documents
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...