Sciweavers

1433 search results - page 191 / 287
» An approach to detecting failures automatically
Sort
View
ICCV
2007
IEEE
16 years 1 months ago
Finding a Closed Boundary by Growing Minimal Paths from a Single Point on 2D or 3D Images
In this paper, we present a new method for segmenting closed contours and surfaces. Our work builds on a variant of the Fast Marching algorithm. First, an initial point on the des...
Fethallah Benmansour, Stephane Bonneau, Laurent D....
MICCAI
2003
Springer
16 years 23 days ago
Robust Estimation for Brain Tumor Segmentation
Given models for healthy brains, tumor segmentation can be seen as a process of detecting abnormalities or outliers that are present with certain image intensity and geometric prop...
Marcel Prastawa, Elizabeth Bullitt, Sean Ho, Guido...
ACSAC
2002
IEEE
15 years 4 months ago
Evaluating the Impact of Automated Intrusion Response Mechanisms
Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Thomas Toth, Christopher Krügel
FGR
2008
IEEE
260views Biometrics» more  FGR 2008»
15 years 6 months ago
On the sustained tracking of human motion
In this paper, we propose an algorithm for sustained tracking of humans, where we combine frame-to-frame articulated motion estimation with a per-frame body detection algorithm. T...
Yaser Sheikh, Ankur Datta, Takeo Kanade
CSMR
2005
IEEE
15 years 5 months ago
Discovering Unanticipated Dependency Schemas in Class Hierarchies
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Gabriela Arévalo, Stéphane Ducasse, ...