Sciweavers

1523 search results - page 182 / 305
» Detecting and Sketching the Common
Sort
View
JDCTA
2010
130views more  JDCTA 2010»
14 years 4 months ago
A Search Algorithm for Clusters in a Network or Graph
A novel breadth-first based structural clustering method for graphs is proposed. Clustering is an important task for analyzing complex networks such as biological networks, World ...
Dongming Chen, Jing Wang, Xiaodong Chen, Xiaowei X...
ICCV
2011
IEEE
13 years 10 months ago
Segmentation from a Box
Drawing a box around an intended segmentation target has become both a popular user interface and a common output for learning-driven detection algorithms. Despite the ubiquity of...
Leo Grady, Marie-Pierre Jolly, Aaron Seitz
CVPR
2008
IEEE
15 years 12 months ago
People-tracking-by-detection and people-detection-by-tracking
Both detection and tracking people are challenging problems, especially in complex real world scenes that commonly involve multiple people, complicated occlusions, and cluttered o...
Mykhaylo Andriluka, Stefan Roth, Bernt Schiele
OSDI
2004
ACM
15 years 10 months ago
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code
Copy-pasted code is very common in large software because programmers prefer reusing code via copy-paste in order to reduce programming effort. Recent studies show that copy-paste...
Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
ACSAC
2007
IEEE
15 years 4 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion