Sciweavers

1503 search results - page 206 / 301
» Detecting Anomalies in Graphs
Sort
View
DAC
2001
ACM
15 years 11 months ago
Publicly Detectable Techniques for the Protection of Virtual Components
Highlighted with the newly released intellectual property (IP) protection white paper by VSI Alliance, the protection of virtual components (VCs) has received a large amount of at...
Gang Qu
93
Voted
CVPR
2010
IEEE
15 years 5 months ago
Part and Appearance Sharing: Recursive Compositional Models for Multi-View Multi-Object Detection
We propose Recursive Compositional Models (RCMs) for simultaneous multi-view multi-object detection and parsing (e.g. view estimation and determining the positions of the object s...
Leo Zhu, Yuanhao Chen, Antonio Torralba, William F...
78
Voted
ICDM
2006
IEEE
139views Data Mining» more  ICDM 2006»
15 years 4 months ago
Detecting Link Spam Using Temporal Information
How to effectively protect against spam on search ranking results is an important issue for contemporary web search engines. This paper addresses the problem of combating one majo...
Guoyang Shen, Bin Gao, Tie-Yan Liu, Guang Feng, Sh...
CVIU
2007
112views more  CVIU 2007»
14 years 10 months ago
Pedestrian detection and tracking in infrared imagery using shape and appearance
In this paper, we present an approach toward pedestrian detection and tracking from infrared imagery using joint shape and appearance cues. A layered representation is first intr...
Congxia Dai, Yunfei Zheng, Xin Li
SIGMOD
2010
ACM
196views Database» more  SIGMOD 2010»
15 years 2 months ago
Connected substructure similarity search
Substructure similarity search is to retrieve graphs that approximately contain a given query graph. It has many applications, e.g., detecting similar functions among chemical com...
Haichuan Shang, Xuemin Lin, Ying Zhang, Jeffrey Xu...