Sciweavers

2362 search results - page 377 / 473
» A new approach to edge detection
Sort
View
DATE
2009
IEEE
106views Hardware» more  DATE 2009»
15 years 8 months ago
Generation of compact test sets with high defect coverage
Abstract-Multi-detect (N-detect) testing suffers from the drawback that its test length grows linearly with N. We present a new method to generate compact test sets that provide hi...
Xrysovalantis Kavousianos, Krishnendu Chakrabarty
ICVS
2009
Springer
15 years 8 months ago
White-Box Evaluation of Computer Vision Algorithms through Explicit Decision-Making
Traditionally computer vision and pattern recognition algorithms are evaluated by measuring differences between final interpretations and ground truth. These black-box evaluations ...
Richard Zanibbi, Dorothea Blostein, James R. Cordy
ICDE
2008
IEEE
126views Database» more  ICDE 2008»
15 years 7 months ago
Monitoring the evolution of interests in the blogosphere
— We describe blogTrust, an innovative modular and extensible prototype application for monitoring changes in the interests of blogosphere participants. We also propose a new app...
Iraklis Varlamis, Vasilis Vassalos, Antonis Palaio...
PAKDD
2007
ACM
152views Data Mining» more  PAKDD 2007»
15 years 7 months ago
Spectral Clustering Based Null Space Linear Discriminant Analysis (SNLDA)
While null space based linear discriminant analysis (NLDA) obtains a good discriminant performance, the ability easily suffers from an implicit assumption of Gaussian model with sa...
Wenxin Yang, Junping Zhang
ACSC
2006
IEEE
15 years 7 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson