Sciweavers

5456 search results - page 919 / 1092
» A study of Object Evolution
Sort
View
AVSS
2008
IEEE
15 years 6 months ago
Evaluation of Background Subtraction Algorithms with Post-Processing
Processing a video stream to segment foreground objects from the background is a critical first step in many computer vision applications. Background subtraction (BGS) is a common...
Donovan H. Parks, Sidney Fels
143
Voted
C3S2E
2008
ACM
15 years 6 months ago
Towards a mutation-based automatic framework for evaluating code clone detection tools
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
Chanchal Kumar Roy, James R. Cordy
MDM
2010
Springer
250views Communications» more  MDM 2010»
15 years 6 months ago
Defending Wireless Sensor Networks against Adversarial Localization
In this paper, we study the issue of defending against adversarial localization in wireless sensor networks. Adversarial localization refers to attacks where an adversary attempts...
Neelanjana Dutta, Abhinav Saxena, Sriram Chellappa...
CIKM
2008
Springer
15 years 6 months ago
The active reading task: e-books and their readers
This paper describes the Active Reading task, a recent addition to the INEX Book Search track1 . This task aims at exploring how people interact with e-books in different scenario...
Monica Landoni
ICALP
2010
Springer
15 years 6 months ago
On the Limitations of Greedy Mechanism Design for Truthful Combinatorial Auctions
We study the combinatorial auction (CA) problem, in which m objects are sold to rational agents and the goal is to maximize social welfare. Of particular interest is the special ca...
Allan Borodin, Brendan Lucier