Sciweavers

CVPR
2012
IEEE
11 years 6 months ago
Changedetection.net: A new change detection benchmark dataset
Change detection is one of the most commonly encountered low-level tasks in computer vision and video processing. A plethora of algorithms have been developed to date, yet no wide...
Nil Goyette, Pierre-Marc Jodoin, Fatih Porikli, Ja...
KDD
2012
ACM
197views Data Mining» more  KDD 2012»
11 years 6 months ago
On the separability of structural classes of communities
Three major factors govern the intricacies of community extraction in networks: (1) the application domain includes a wide variety of networks of fundamentally different natures,...
Bruno D. Abrahao, Sucheta Soundarajan, John E. Hop...
ICCV
2011
IEEE
12 years 4 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz
ICANN
2011
Springer
12 years 7 months ago
Automatic Seizure Detection Incorporating Structural Information
Abstract. Traditional seizure detection algorithms act on single channels ignoring the synchronously recorded, inherently interdependent multichannel nature of EEG. However, the sp...
Borbala Hunyadi, Maarten De Vos, Marco Signoretto,...
WSC
2008
13 years 6 months ago
An application of parallel Monte Carlo modeling for real-time disease surveillance
The global health, threatened by emerging infectious diseases, pandemic influenza, and biological warfare, is becoming increasingly dependent on the rapid acquisition, processing,...
David W. Bauer, Mojdeh Mohtashemi
ARITH
2001
IEEE
13 years 8 months ago
On-line Arithmetic for Detection in Digital Communication Receivers
This paper demonstrates the advantages of using on-line arithmetic for traditional and advanced detection algorithms for communication systems. Detection is one of the core comput...
Sridhar Rajagopal, Joseph R. Cavallaro
KBSE
2006
IEEE
13 years 10 months ago
Automatic Generation of Detection Algorithms for Design Defects
Maintenance is recognised as the most difficult and expansive activity of the software development process. Numerous techniques and processes have been proposed to ease the mainte...
Naouel Moha, Yann-Gaël Guéhéneu...
CEEMAS
2007
Springer
13 years 10 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
13 years 10 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick