Sciweavers

756 search results - page 52 / 152
» Decentralized detection and classification using kernel meth...
Sort
View
CVPR
2009
IEEE
16 years 4 months ago
Echocardiogram View Classification using Edge Filtered Scale-invariant Motion Features
In an 2D echocardiogram exam, an ultrasound probe samples the heart with 2D slices. Changing the orientation and position on the probe changes the slice viewpoint, altering the ...
Ritwik Kumar, Fei Wang, David Beymer, Tanveer Fath...
ECCV
2010
Springer
15 years 1 months ago
The Semi-Explicit Shape Model for Multi-object Detection and Classification
We propose a model for classification and detection of object classes where the number of classes may be large and where multiple instances of object classes may be present in an i...
PST
2004
14 years 11 months ago
Detection of New Malicious Code Using N-grams Signatures
Signature-based malicious code detection is the standard technique in all commercial anti-virus software. This method can detect a virus only after the virus has appeared and cause...
Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray...
64
Voted
ICPR
2008
IEEE
15 years 11 months ago
Recovering audio-to-video synchronization by audiovisual correlation analysis
Audio-to-video synchronization (AV-sync) may drift and is difficult to recover without dedicated human effort. In this work, we develop an interactive method to recover the drifte...
Yoichi Sato, Yuyu Liu
ADMA
2008
Springer
114views Data Mining» more  ADMA 2008»
15 years 4 months ago
Using Data Mining Methods to Predict Personally Identifiable Information in Emails
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...