Sciweavers

257 search results - page 26 / 52
» Automatic red-eye detection and correction
Sort
View
ISBI
2011
IEEE
14 years 1 months ago
Interventional MR-imaging for thermal ablation therapy
Magnetic Resonance Imaging (MRI) has several unique advantages for guiding thermal ablation therapies. It not only provides excellent soft-tissue contrast and multiplanar capabili...
Eva Rothgang, Wesley D. Gilson, Wilhelm Strehl, Li...
MMM
2012
Springer
324views Multimedia» more  MMM 2012»
13 years 5 months ago
Sensor-Based Analysis of User Generated Video for Multi-camera Video Remixing
In this work we propose to exploit context sensor data for analyzing user generated videos. Firstly, we perform a low-level indexing of the recorded media with the instantaneous co...
Francesco Cricri, Igor D. D. Curcio, Sujeet Mate, ...
SAC
2008
ACM
14 years 8 months ago
ICER: a tool for finding errors in a UML model
Detecting errors in an early phase of software development can help to reduce the cost of software systems. Many research attempts presented a fixed set of rules to help finding e...
Wuwei Shen, Dae-Kyoo Kim
SIGMOD
2004
ACM
184views Database» more  SIGMOD 2004»
15 years 10 months ago
CORDS: Automatic Discovery of Correlations and Soft Functional Dependencies
The rich dependency structure found in the columns of real-world relational databases can be exploited to great advantage, but can also cause query optimizers--which usually assum...
Ihab F. Ilyas, Volker Markl, Peter J. Haas, Paul B...
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh