Sciweavers

872 search results - page 26 / 175
» Sketch-based change detection: methods, evaluation, and appl...
Sort
View
CSFW
2009
IEEE
14 years 3 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...
CVPR
2011
IEEE
13 years 4 months ago
Scalable Multi-class Object Detection
Scalability of object detectors with respect to the number of classes is a very important issue for applications where many object classes need to be detected. While combining sin...
Nima Razavi, Juergen Gall, Luc VanGool
ICIP
2001
IEEE
14 years 10 months ago
A unified memory based approach to cut, dissolve, key frame and scene analysis
We review a memory-based buffer model of visual perception, that combines the lower and middle stages in the analysis of video. This model was originally developed for the detecti...
Aya Aner, John R. Kender
CORR
2008
Springer
216views Education» more  CORR 2008»
13 years 8 months ago
Building an interpretable fuzzy rule base from data using Orthogonal Least Squares Application to a depollution problem
In many fields where human understanding plays a crucial role, such as bioprocesses, the capacity of extracting knowledge from data is of critical importance. Within this framewor...
Sébastien Destercke, Serge Guillaume, Brigi...
ICCSA
2007
Springer
14 years 2 months ago
ontoX - A Method for Ontology-Driven Information Extraction
Information Extraction (IE) is an important research field within the Artificial Intelligence community, for it tries to extract relevant information out of vast amounts of data....
Burcu Yildiz, Silvia Miksch