Sciweavers

113 search results - page 13 / 23
» Detection of phishing webpages based on visual similarity
Sort
View
ICASSP
2011
IEEE
14 years 2 months ago
Slice error concealment based on size-adaptive SSIM matching and motion vector outlier rejection
Consecutive corrupted MBs or slice errors are commonly seen in modern video transmission systems. Temporal error concealment is an effective approach to reduce the impact of error...
Hai Gao, Jo Yew Tham, Wei Siong Lee, Kwong Huang G...
ICDAR
2011
IEEE
13 years 10 months ago
Wall Patch-Based Segmentation in Architectural Floorplans
Abstract—Segmentation of architectural floorplans is a challenging task, mainly because of the large variability in the notation between different plans. In general, traditional...
Lluís-Pere de las Heras, Joan Mas, Gemma S&...
AROBOTS
2010
180views more  AROBOTS 2010»
14 years 10 months ago
Reactive direction control for a mobile robot: a locust-like control of escape direction emerges when a bilateral pair of model
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...
EUROCAST
1997
Springer
156views Hardware» more  EUROCAST 1997»
15 years 2 months ago
A Computational Model for Visual Size, Location and Movement
The ability to detect object size, location and movement is essential for a visual system in either a biological or man made environment. In this paper we present a model for esti...
Miguel Alemán-Flores, K. Nicholas Leibovic,...
APSEC
2002
IEEE
15 years 3 months ago
On Detection of Gapped Code Clones using Gap Locations
It is generally said that code clone is one of the factors to make software maintenance difficult. A code clone is a code portion in source files that is identical or similar to...
Yasushi Ueda, Toshihiro Kamiya, Shinji Kusumoto, K...