Sciweavers

2236 search results - page 310 / 448
» Intrusion detection techniques and approaches
Sort
View
MM
2006
ACM
180views Multimedia» more  MM 2006»
14 years 3 months ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
BCS
2008
13 years 10 months ago
On Using Physical Analogies for Feature and Shape Extraction in Computer Vision
: There is a rich literature of approaches to image feature extraction in computer vision. Many sophisticated approaches exist for low- and high-level feature extraction but can be...
Mark S. Nixon, Cem Direkoglu, Xin U. Liu, David J....
ACSD
2010
IEEE
222views Hardware» more  ACSD 2010»
13 years 7 months ago
Efficient Model Checking of PSL Safety Properties
Abstract--Safety properties are an important class of properties as in the industrial use of model checking a large majority of the properties to be checked are safety properties. ...
Tuomas Launiainen, Keijo Heljanko, Tommi A. Juntti...
CVPR
2004
IEEE
14 years 11 months ago
Perceptual Organization of Radial Symmetries
Radial symmetry is an important perceptual cue for the feature-based representation, fixation, and description of large-scale data sets. A new approach based on iterative voting a...
Qing Yang, Bahram Parvin
IPMI
2003
Springer
14 years 10 months ago
Permutation Tests for Classification: Towards Statistical Significance in Image-Based Studies
Abstract. Estimating statistical significance of detected differences between two groups of medical scans is a challenging problem due to the high dimensionality of the data and th...
Polina Golland, Bruce Fischl