Sciweavers

33 search results - page 6 / 7
» Inconsistencies in Edge Detector Evaluation
Sort
View
SOSP
2007
ACM
14 years 2 months ago
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs
Software defects significantly reduce system dependability. Among various types of software bugs, semantic and concurrency bugs are two of the most difficult to detect. This pape...
Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weiha...
CIMAGING
2008
123views Hardware» more  CIMAGING 2008»
13 years 7 months ago
Non-homogeneous ICD optimization for targeted reconstruction of volumetric CT
Medical imaging typically requires the reconstruction of a limited region of interest (ROI) to obtain a high resolution image of the anatomy of interest. Although targeted reconst...
Zhou Yu, Jean-Baptiste Thibault, Charles A. Bouman...
EUROSEC
2010
ACM
13 years 11 months ago
Managing intrusion detection rule sets
The prevalent use of the signature-based approach in modern intrusion detection systems (IDS) emphasizes the importance of the efficient management of the employed signature sets....
Natalia Stakhanova, Ali A. Ghorbani
ICCV
2007
IEEE
14 years 3 days ago
Scale-Dependent 3D Geometric Features
Three-dimensional geometric data play fundamental roles in many computer vision applications. However, their scale-dependent nature, i.e. the relative variation in the spatial ext...
John Novatnack, Ko Nishino
ICCV
2009
IEEE
14 years 10 months ago
Multiple Kernels for Object Detection
Our objective is to obtain a state-of-the art object category detector by employing a state-of-the-art image classifier to search for the object in all possible image subwindows....
Andrea Vedaldi, Varun Gulshan, Manik Varma, Andrew...