Sciweavers

2990 search results - page 217 / 598
» Thresholding for Change Detection
Sort
View
142
Voted
PRL
2006
225views more  PRL 2006»
15 years 3 months ago
A straight line detection using principal component analysis
A straight line detection algorithm is presented. The algorithm separates row and column edges from edge image using their primitive shapes. The edges are labeled, and the princip...
Yun-Seok Lee, Han-Suh Koo, Chang-Sung Jeong
149
Voted
ITNG
2010
IEEE
15 years 2 months ago
Scalable Intrusion Detection with Recurrent Neural Networks
The ever-growing use of the Internet comes with a surging escalation of communication and data access. Most existing intrusion detection systems have assumed the one-size-fits-all...
Longy O. Anyanwu, Jared Keengwe, Gladys A. Arome
139
Voted
WCRE
2010
IEEE
15 years 2 months ago
From Whence It Came: Detecting Source Code Clones by Analyzing Assembler
To date, most clone detection techniques have concentrated on various forms of source code analysis, often by analyzing token streams. In this paper, we introduce a complementary ...
Ian J. Davis, Michael W. Godfrey
122
Voted
ICIP
2010
IEEE
15 years 1 months ago
Video categorization using object of interest detection
Object of Interest (OOI) detection has been widely used in many recent works in video analysis, especially in video similarity and video retrieval. In this paper, we describe a ge...
Adarsh Kowdle, Kuo-Wei Chang, Tsuhan Chen
151
Voted
ITIIS
2010
190views more  ITIIS 2010»
14 years 10 months ago
An Efficient String Matching Algorithm Using Bidirectional and Parallel Processing Structure for Intrusion Detection System
Rapid growth of internet applications has increased the importance of intrusion detection system (IDS) performance. String matching is the most computation-consuming task in IDS. ...
Gwo-Ching Chang, Yue-Der Lin