Sciweavers

6318 search results - page 23 / 1264
» Data Leakage Detection
Sort
View
ICIP
2007
IEEE
15 years 11 months ago
Fourier Shape Descriptors of Pixel Footprints for Road Extraction from Satellite Images
In this paper, an automatic road tracking method is presented for detecting roads from satellite images. This method is based on shape classification of a local homogeneous region...
Jiuxiang Hu, Anshuman Razdan, John Femiani, Peter ...
ACCV
2006
Springer
15 years 3 months ago
Minimal Weighted Local Variance as Edge Detector for Active Contour Models
Performing segmentation of narrow, elongated structures with low contrast boundaries is a challenging problem. Boundaries of these structures are difficult to be located when noise...
Max W. K. Law, Albert C. S. Chung
TRUST
2010
Springer
15 years 2 months ago
SBAP: Software-Based Attestation for Peripherals
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Yanlin Li, Jonathan M. McCune, Adrian Perrig
DEXA
2005
Springer
118views Database» more  DEXA 2005»
15 years 3 months ago
Detecting Semantically Correct Changes to Relevant Unordered Hidden Web Data
Current proposals for XML change detection use structural constraints to detect the changes and they ignore semantic constraints. Consequently, they may produce semantically incorr...
Vladimir Kovalev, Sourav S. Bhowmick
CORR
2011
Springer
207views Education» more  CORR 2011»
14 years 4 months ago
Detection of Spatial Changes using Spatial Data Mining
This paper uses the techniques of spatial data mining (SDM) and change detection (CD) in the field of geospatial information processing. Assuming the feasibility of discovering kno...
B. G. Kodge, P. S. Hiremath