Sciweavers

2990 search results - page 531 / 598
» Thresholding for Change Detection
Sort
View
PERVASIVE
2006
Springer
13 years 9 months ago
The Diet-Aware Dining Table: Observing Dietary Behaviors over a Tabletop Surface
We are what we eat. Our everyday food choices affect our long-term and short-term health. In the traditional health care, professionals assess and weigh each individual's diet...
Keng-hao Chang, Shih-yen Liu, Hao-Hua Chu, Jane Yu...
SIAMSC
2008
237views more  SIAMSC 2008»
13 years 9 months ago
A Variational Shape Optimization Approach for Image Segmentation with a Mumford--Shah Functional
We introduce a novel computational method for a Mumford-Shah functional, which decomposes a given image into smooth regions separated by closed curves. Casting this as a shape opti...
Günay Dogan, Pedro Morin, Ricardo H. Nochetto
SIGKDD
2008
150views more  SIGKDD 2008»
13 years 9 months ago
Learning to improve area-under-FROC for imbalanced medical data classification using an ensemble method
This paper presents our solution for KDD Cup 2008 competition that aims at optimizing the area under ROC for breast cancer detection. We exploited weighted-based classification me...
Hung-Yi Lo, Chun-Min Chang, Tsung-Hsien Chiang, Ch...
SIGMETRICS
2008
ACM
13 years 9 months ago
Long range mutual information
Network traffic modeling generally views traffic as a superposition of flows that creates a timeseries of volume counts (e.g. of bytes or packets). What is omitted from this view ...
Nahur Fonseca, Mark Crovella, Kavé Salamati...
JCP
2007
127views more  JCP 2007»
13 years 9 months ago
Defending Cyberspace with Fake Honeypots
—Honeypots are computer systems designed for no purpose other than recording attacks on them. Cyberattackers should avoid them since honeypots jeopardize the secrecy of attack me...
Neil C. Rowe, E. John Custy, Binh T. Duong