Sciweavers

495 search results - page 31 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
MM
2004
ACM
151views Multimedia» more  MM 2004»
14 years 1 months ago
Affinity relation discovery in image database clustering and content-based retrieval
In this paper, we propose a unified framework, called Markov Model Mediator (MMM), to facilitate image database clustering and to improve the query performance. The structure of t...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
ICIP
2008
IEEE
14 years 9 months ago
Motion detection with false discovery rate control
Visual surveillance applications such as object identification, object tracking, and anomaly detection require reliable motion detection as an initial processing step. Such a dete...
David A. Castañon, J. Mike McHugh, Janusz K...
DIS
1998
Springer
13 years 12 months ago
Development of SDS2: Smart Discovery System for Simultaneous Equation Systems
SDS2 is a system to discover and identify the quantitative model consisting of simultaneous equations re ecting the rst principles underlying the objective process through experi...
Takashi Washio, Hiroshi Motoda
TSD
2009
Springer
14 years 2 months ago
On a Computational Model for Language Acquisition: Modeling Cross-Speaker Generalisation
Abstract. The discovery of words by young infants involves two interrelated processes: (a) the detection of recurrent word-like acoustic patterns in the speech signal, and (b) cros...
Louis ten Bosch, Joris Driesen, Hugo Van Hamme, Lo...
HOTSWUP
2009
ACM
14 years 11 days ago
An Implementation of the Linux Software Repository Model for Other Operating Systems
Year after year, the frequency of updated releases of software continues to increase. Without an automated install process, the result is either that a system installs software wi...
Neil McNab, Anthony Bryan