Sciweavers

910 search results - page 144 / 182
» Detecting False Matches in String Matching Algorithms
Sort
View
ICIP
2010
IEEE
15 years 11 days ago
Snakules: Snakes that seek spicules on mammography
We present a new method called "snakules" for the annotation of spicules on mammography. Snakules employs parametric open-ended snakes that are deployed in a region arou...
Gautam S. Muralidhar, Alan C. Bovik, Mia K. Markey
IJDAR
2011
223views more  IJDAR 2011»
14 years 6 months ago
ICDAR2009 handwriting segmentation contest
The Handwriting Segmentation Contest was organized in the context of ICDAR2009 conference in order to record recent advances in off-line handwriting segmentation. This paper descr...
Basilios Gatos, Nikolaos Stamatopoulos, Georgios L...
CCS
2005
ACM
15 years 8 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CVPR
2008
IEEE
16 years 5 months ago
Order consistent change detection via fast statistical significance testing
Robustness to illumination variations is a key requirement for the problem of change detection which in turn is a fundamental building block for many visual surveillance applicati...
Maneesh Singh, Vasu Parameswaran, Visvanathan Rame...
MM
2004
ACM
137views Multimedia» more  MM 2004»
15 years 8 months ago
Towards auto-documentary: tracking the evolution of news stories
News videos constitute an important source of information for tracking and documenting important events. In these videos, news stories are often accompanied by short video shots t...
Pinar Duygulu, Jia-Yu Pan, David A. Forsyth