Sciweavers

472 search results - page 29 / 95
» Taking Topic Detection From Evaluation to Practice
Sort
View
TRECVID
2008
13 years 10 months ago
Surveillance Event Detection
We have developed and evaluated three generalized systems for event detection. The first system is a simple brute force search method, where each space-time location in the video ...
Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangli...
ICST
2010
IEEE
13 years 7 months ago
Automated Test Data Generation on the Analyses of Feature Models: A Metamorphic Testing Approach
A Feature Model (FM) is a compact representation of all the products of a software product line. The automated extraction of information from FMs is a thriving research topic invo...
Sergio Segura, Robert M. Hierons, David Benavides,...
CIVR
2007
Springer
155views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Detection of near-duplicate images for web search
Among the vast numbers of images on the web are many duplicates and near-duplicates, that is, variants derived from the same original image. Such near-duplicates appear in many we...
Jun Jie Foo, Justin Zobel, Ranjan Sinha, Seyed M. ...
BMCBI
2010
105views more  BMCBI 2010»
13 years 9 months ago
Evaluation of fecal mRNA reproducibility via a marginal transformed mixture modeling approach
Background: Developing and evaluating new technology that enables researchers to recover gene-expression levels of colonic cells from fecal samples could be key to a non-invasive ...
Nysia I. George, Joanne R. Lupton, Nancy D. Turner...
INFOCOM
2011
IEEE
13 years 12 days ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...