Sciweavers

2025 search results - page 117 / 405
» On the Utility of Inference Mechanisms
Sort
View
SEC
2008
13 years 10 months ago
Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models
The Session Initiation Protocol (SIP) has been used widely for Voice over IP (VoIP) service because of its potential advantages, economical efficiency and call setup simplicity. Ho...
Dongwon Seo, Heejo Lee, Ejovi Nuwere
CVPR
2006
IEEE
14 years 11 months ago
Searching Off-line Arabic Documents
Currently an abundance of historical manuscripts, journals, and scientific notes remain largely unaccessible in library archives. Manual transcription and publication of such docu...
Jim Chan, Celal Ziftci, David A. Forsyth
CVPR
2006
IEEE
14 years 11 months ago
Noise Estimation from a Single Image
In order to work well, many computer vision algorithms require that their parameters be adjusted according to the image noise level, making it an important quantity to estimate. W...
Ce Liu, William T. Freeman, Richard Szeliski, Sing...
CVPR
2006
IEEE
14 years 11 months ago
Body Localization in Still Images Using Hierarchical Models and Hybrid Search
We present a 3-level hierarchical model for localizing human bodies in still images from arbitrary viewpoints. We first fit a simple tree-structured model defined on a small landm...
Jiayong Zhang, Jiebo Luo, Robert T. Collins, Yanxi...
ICIP
2009
IEEE
14 years 10 months ago
Bayesian Blind Deconvolution From Differently Exposed Image Pairs
Photographs acquired under low-light conditions require long exposure times and therefore exhibit significant blurring due to the shaking of the camera. Using shorter exposure tim...