Sciweavers

198 search results - page 28 / 40
» Robust lossless data hiding: Analysis and evaluation
Sort
View
IMC
2005
ACM
14 years 2 months ago
Network Anomography
Anomaly detection is a first and important step needed to respond to unexpected problems and to assure high performance and security in IP networks. We introduce a framework and ...
Yin Zhang, Zihui Ge, Albert G. Greenberg, Matthew ...
PVLDB
2010
107views more  PVLDB 2010»
13 years 7 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
CVPR
2006
IEEE
14 years 10 months ago
Fusion of Detection and Matching Based Approaches for Laser Based Multiple People Tracking
Most of visual tracking algorithms have been achieved by matching-based searching strategies or detection-based data association algorithms. In this paper, our objective is to ana...
Jinshi Cui, Huijing Zhao, Ryosuke Shibasaki
ISBI
2007
IEEE
14 years 2 months ago
Advanced Particle Filtering for Multiple Object Tracking in Dynamic Fluorescence Microscopy Images
Quantitative analysis of dynamical processes in living cells by means of fluorescence microscopy imaging requires tracking of hundreds of bright spots in noisy image sequences. D...
Ihor Smal, Wiro J. Niessen, Erik H. W. Meijering
CN
2006
88views more  CN 2006»
13 years 8 months ago
Relevance of massively distributed explorations of the Internet topology: Qualitative results
Internet maps are generally constructed using the traceroute tool from a few sources to many destinations. It appeared recently that this exploration process gives a partial and bi...
Jean-Loup Guillaume, Matthieu Latapy, Damien Magon...