Sciweavers

334 search results - page 49 / 67
» A first step towards algorithm plagiarism detection
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Routing in the Dark: Pitch Black
In many networks, such as mobile ad-hoc networks and friend-to-friend overlay networks, direct communication between nodes is limited to specific neighbors. Often these networks ...
Nathan S. Evans, Chris GauthierDickey, Christian G...
ADC
2008
Springer
153views Database» more  ADC 2008»
14 years 11 months ago
A Confidence Based Recognition System for TV Commercial Extraction
Automatic real-time recognition of TV commercials is an essential step for TV broadcast monitoring. It comprises two basic tasks: rapid detection of known commercials that are sto...
Yijun Li, Dianqing Zhang, Xiangmin Zhou, Jesse S. ...
87
Voted
ICIP
2009
IEEE
14 years 7 months ago
Robust object tracking using correspondence voting for smart surveillance visual sensing nodes
This paper presents a bottom-up tracking algorithm for surveillance applications where speed and reliability in the case of multiple matches and occlusions are major concerns. The...
Mayssaa Al Najjar, Soumik Ghosh, Magdy Bayoumi
87
Voted
TMI
2008
109views more  TMI 2008»
14 years 9 months ago
Efficient Multilevel Brain Tumor Segmentation With Integrated Bayesian Model Classification
Abstract-- We present a new method for automatic segmentation of heterogeneous image data that takes a step toward bridging the gap between bottom-up affinity-based segmentation me...
Jason J. Corso, Eitan Sharon, S. Dube, Suzie El-Sa...
CVPR
2007
IEEE
15 years 11 months ago
Metropolis-Hasting techniques for finite-element-based registration
In this paper, we focus on the design of Markov Chain Monte Carlo techniques in a statistical registration framework based on finite element basis (FE). Due to the use of FE basis...
Adeline M. M. Samson, Frédéric J. P....