Sciweavers

ICCV
2005
IEEE
13 years 10 months ago
TemporalBoost for Event Recognition
This paper contributes a new boosting paradigm to achieve detection of events in video. Previous boosting paradigms in vision focus on single frame detection and do not scale to v...
Paul Smith, Niels da Vitoria Lobo, Mubarak Shah
CRV
2005
IEEE
118views Robotics» more  CRV 2005»
13 years 10 months ago
An Object Detection System using Image Reconstruction with PCA
We present an object detection system that is applied to detecting pedestrians in still images, without assuming any a priori knowledge about the image. The system works as follow...
Luis Malagón-Borja, Olac Fuentes
ICPR
2010
IEEE
13 years 10 months ago
The Detection of Concept Frames Using Clustering Multi-Instance Learning
Abstract—The classification of sequences requires the combination of information from different time points. In this paper the detection of facial expressions is considered. Exp...
David Tax, Michel Valstar
ACNS
2006
Springer
111views Cryptology» more  ACNS 2006»
13 years 10 months ago
Adaptive Detection of Local Scanners
Network attacks often employ scanning to locate vulnerable hosts and services. Fast and accurate detection of local scanners is key to containing an epidemic in its early stage. Ex...
Ahren Studer, Chenxi Wang
VTC
2006
IEEE
117views Communications» more  VTC 2006»
13 years 10 months ago
Low Complexity Soft Interference Cancellation for MIMO-Systems
— Iterative equalization has emerged as an efficient means of achieving near-capacity detection performance in multiple-antenna (MIMO) systems. However, many proposed detection ...
Steffen Bittner, Ernesto Zimmermann, Gerhard Fettw...
INFOCOM
2006
IEEE
13 years 10 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
ICMCS
2006
IEEE
142views Multimedia» more  ICMCS 2006»
13 years 10 months ago
Asymptotically Optimal Scalar Quantizers for QIM Watermark Detection
This paper investigates asymptotically optimal scalar quantizers to address QIM watermark detection with i.i.d. host data and additive noise. False-alarm probability of detection ...
Jean-Philippe Boyer, Pierre Duhamel, Jacques Blanc...
OOPSLA
2007
Springer
13 years 10 months ago
Detection and correction of design defects in object-oriented designs
Design defects come from poor design choices and have the effect of degrading the quality of object-oriented designs. Therefore, they present opportunities for improvements. Howev...
Naouel Moha
KIVS
2007
Springer
13 years 10 months ago
A System for in-Network Anomaly Detection
Today, the Internet is used by companies frequently since it simplifies daily work, speeds up communication, and saves money. But the more popular the Internet gets the more it su...
Thomas Gamer
CEEMAS
2007
Springer
13 years 10 months ago
Collaborative Attack Detection in High-Speed Networks
We present a multi-agent system designed to detect malicious traffic in high-speed networks. In order to match the performance requirements related to the traffic volume, the net...
Martin Rehák, Michal Pechoucek, Pavel Celed...