Sciweavers

2990 search results - page 522 / 598
» Thresholding for Change Detection
Sort
View
MCS
2010
Springer
13 years 11 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli
DIALM
2005
ACM
100views Algorithms» more  DIALM 2005»
13 years 11 months ago
On the pitfalls of geographic face routing
Geographic face routing algorithms have been widely studied in the literature [1, 8, 13]. All face routing algorithms rely on two primitives: planarization and face traversal. The...
Young-Jin Kim, Ramesh Govindan, Brad Karp, Scott S...
DAGM
2008
Springer
13 years 11 months ago
Postprocessing of Optical Flows Via Surface Measures and Motion Inpainting
Dense optical flow fields are required for many applications. They can be obtained by means of various global methods which employ regularization techniques for propagating estimat...
Claudia Kondermann, Daniel Kondermann, Christoph S...
HCI
2007
13 years 11 months ago
Vision Based Laser Pointer Interaction for Flexible Screens
In recent years high quality interaction devices have become very popular in our environment. The industries are also currently undergoing rapid change and various technologies hav...
Nam Woo Kim, Seung Jae Lee, Byung-Gook Lee, Joon-J...
ICWS
2008
IEEE
13 years 11 months ago
Extending WS-Notification with an Expressive Event Notification Broker
Web service applications integrate explicit client-service interactions with notification-style programming. Such event-driven interactions are often called implicit invocations b...
Sven De Labey, Eric Steegmans