Sciweavers

3629 search results - page 611 / 726
» A More Efficient Use of Delta-CRLs
Sort
View
DICTA
2008
14 years 11 months ago
Exploiting Part-Based Models and Edge Boundaries for Object Detection
This paper explores how to exploit shape information to perform object class recognition. We use a sparse partbased model to describe object categories defined by shape. The spars...
Josephine Sullivan, Oscar M. Danielsson, Stefan Ca...
MEDIAFORENSICS
2010
14 years 11 months ago
Forensic hash for multimedia information
Digital multimedia such as images and videos are prevalent on today's internet and cause significant social impact, which can be evidenced by the proliferation of social netw...
Wenjun Lu, Avinash L. Varna, Min Wu
FORTE
2008
14 years 11 months ago
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning
Network-based fuzz testing has become an effective mechanism to ensure the security and reliability of communication protocol systems. However, fuzz testing is still conducted in a...
Guoqiang Shu, Yating Hsu, David Lee
MIE
2008
177views Healthcare» more  MIE 2008»
14 years 11 months ago
Process Mining Techniques: an Application to Stroke Care
In a competitive health-care market, hospitals have to focus on ways to streamline their processes in order to deliver high quality care while at the same time reducing costs. To a...
Ronny Mans, Helen Schonenberg, Giorgio Leonardi, S...
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
14 years 11 months ago
Maximal Quasi-Bicliques with Balanced Noise Tolerance: Concepts and Co-clustering Applications
The rigid all-versus-all adjacency required by a maximal biclique for its two vertex sets is extremely vulnerable to missing data. In the past, several types of quasi-bicliques ha...
Jinyan Li, Kelvin Sim, Guimei Liu, Limsoon Wong