Sciweavers

2236 search results - page 368 / 448
» Intrusion detection techniques and approaches
Sort
View
CVPR
2010
IEEE
14 years 5 months ago
Automatic Discovery of Meaningful Object Parts with Latent CRFs
Object recognition is challenging due to high intra-class variability caused, e.g., by articulation, viewpoint changes, and partial occlusion. Successful methods need to strike a...
Paul Schnitzspan, Stefan Roth, Bernt Schiele
SI3D
2009
ACM
14 years 4 months ago
Multiscale 3D navigation
We present a comprehensive system for multiscale navigation of 3-dimensional scenes, and demonstrate our approach on multiscale datasets such as the Earth. Our system incorporates...
James McCrae, Igor Mordatch, Michael Glueck, Azam ...
CPAIOR
2009
Springer
14 years 3 months ago
Learning How to Propagate Using Random Probing
Abstract. In constraint programming there are often many choices regarding the propagation method to be used on the constraints of a problem. However, simple constraint solvers usu...
Efstathios Stamatatos, Kostas Stergiou
BIBE
2007
IEEE
133views Bioinformatics» more  BIBE 2007»
14 years 3 months ago
Denoising of Array-Based DNA Copy Number Data Using The Dual-tree Complex Wavelet Transform
—Array-based comparative genomic hybridization (array CGH) is a highly efficient technique, allowing the simultaneous measurement of genomic DNA copy number at hundreds or thous...
Nha Nguyen, Heng Huang, Soontorn Oraintara, Yuhang...
CIVR
2007
Springer
247views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Near-duplicate keyframe retrieval with visual keywords and semantic context
Near-duplicate keyframes (NDK) play a unique role in large-scale video search, news topic detection and tracking. In this paper, we propose a novel NDK retrieval approach by explo...
Xiao Wu, Wanlei Zhao, Chong-Wah Ngo