Sciweavers

1115 search results - page 171 / 223
» Active Graph Cuts
Sort
View
APSEC
2001
IEEE
15 years 7 months ago
Tailoring and Verifying Software Process
Process tailoring and verification are very important since project-specific processes are tailored from an organizational process standard and many quality assurance activities a...
Il-Chul Yoon, Sang-Yoon Min, Doo-Hwan Bae
130
Voted
CEAS
2008
Springer
15 years 5 months ago
Activity-centred Search in Email
We consider activity-centered tasks in email, including the novel task of predicting future involvement of persons from an enterprise in an ongoing activity represented by a folde...
Einat Minkov, Ramnath Balasubramanyan, William W. ...
145
Voted
CORR
2008
Springer
118views Education» more  CORR 2008»
15 years 3 months ago
Strategic Alert Throttling for Intrusion Detection Systems
: Network intrusion detection systems are themselves becoming targets of attackers. Alert flood attacks may be used to conceal malicious activity by hiding it among a deluge of fa...
Gianni Tedesco, Uwe Aickelin
203
Voted
CVPR
2009
IEEE
16 years 11 months ago
Understanding Videos, Constructing Plots - Learning a Visually Grounded Storyline Model from Annotated Videos
Analyzing videos of human activities involves not only recognizing actions (typically based on their appearances), but also determining the story/plot of the video. The storyline...
Abhinav Gupta (University of Maryland), Praveen Sr...
124
Voted
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
15 years 10 months ago
Three Results on Frequency Assignment in Linear Cellular Networks
In the frequency assignment problem we are given a graph representing a wireless network and a sequence of requests, where each request is associated with a vertex. Each request h...
Marek Chrobak, Jiri Sgall