Sciweavers

44 search results - page 8 / 9
» On updates that constrain the features' connections during l...
Sort
View
SP
1999
IEEE
184views Security Privacy» more  SP 1999»
13 years 11 months ago
A Data Mining Framework for Building Intrusion Detection Models
There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
ACCV
2006
Springer
14 years 1 months ago
Fusion of 3D and Appearance Models for Fast Object Detection and Pose Estimation
Real-time estimation of a camera’s pose relative to an object is still an open problem. The difficulty stems from the need for fast and robust detection of known objects in the s...
Hesam Najafi, Yakup Genc, Nassir Navab
ICIP
2006
IEEE
14 years 9 months ago
Aggregated Dynamic Background Modeling
Standard practices in background modeling learn a separate model for every pixel in the image. However, in dynamic scenes the connection between an observation and the place where...
Amit Adam, Ehud Rivlin, Ilan Shimshoni
WSC
2007
13 years 9 months ago
Simulation of adaptive project management analytics
Typically, IT projects are delivered over-budget and behind schedule. In this paper, we explore the effects of common project management practices that contribute to these problem...
Léa Amandine Deleris, Sugato Bagchi, Shubir...
ICCV
2011
IEEE
12 years 7 months ago
Struck: Structured Output Tracking with Kernels
Adaptive tracking-by-detection methods are widely used in computer vision for tracking arbitrary objects. Current approaches treat the tracking problem as a classification task a...
Sam Hare, Amir Saffari, Philip H.S. Torr