Sciweavers

1503 search results - page 233 / 301
» Detecting Anomalies in Graphs
Sort
View
POPL
1997
ACM
15 years 2 months ago
Shape Types
Type systems currently available for imperative languages are too weak to detect a significant class of programming errors. For example, they cannot express the property that a l...
Pascal Fradet, Daniel Le Métayer
SDM
2012
SIAM
340views Data Mining» more  SDM 2012»
13 years 12 days ago
IntruMine: Mining Intruders in Untrustworthy Data of Cyber-physical Systems
A Cyber-Physical System (CPS) integrates physical (i.e., sensor) devices with cyber (i.e., informational) components to form a situation-aware system that responds intelligently t...
Lu An Tang, Quanquan Gu, Xiao Yu, Jiawei Han, Thom...
GBRPR
2009
Springer
15 years 4 months ago
An Irregular Pyramid for Multi-scale Analysis of Objects and Their Parts
We present an irregular image pyramid which is derived from multi-scale analysis of segmented watershed regions. Our framework is based on the development of regions in the Gaussia...
Martin Drauschke
ICPR
2008
IEEE
15 years 4 months ago
Ranking the local invariant features for the robust visual saliencies
Local invariant feature based methods have been proven to be effective in computer vision for object recognition and learning. But for an image, the number of points detected and ...
Shengping Xia, Peng Ren, Edwin R. Hancock
LCPC
2005
Springer
15 years 3 months ago
Concurrency Analysis for Parallel Programs with Textually Aligned Barriers
Abstract. A fundamental problem in the analysis of parallel programs is to determine when two statements in a program may run concurrently. This analysis is the parallel analog to ...
Amir Kamil, Katherine A. Yelick