Sciweavers

4307 search results - page 515 / 862
» Dynamic Spyware Analysis
Sort
View
ICDAR
2007
IEEE
15 years 10 months ago
Handwritten Word Recognition Using Conditional Random Fields
The paper describes a lexicon driven approach for word recognition on handwritten documents using Conditional Random Fields(CRFs). CRFs are discriminative models and do not make a...
Shravya Shetty, Harish Srinivasan, Sargur N. Sriha...
CAIP
2007
Springer
217views Image Analysis» more  CAIP 2007»
15 years 10 months ago
Mixture Models Based Background Subtraction for Video Surveillance Applications
— Background subtraction is a method commonly used to segment objects of interest in image sequences. By comparing new frames to a background model, regions of interest can be fo...
Chris Poppe, Gaëtan Martens, Peter Lambert, R...
CCS
2007
ACM
15 years 10 months ago
Analyzing the vulnerability of superpeer networks against attack
In this paper, we develop an analytical framework to measure the vulnerability of superpeer networks against attack. Two different kinds of attacks namely deterministic and degre...
Bivas Mitra, Fernando Peruani, Sujoy Ghose, Niloy ...
CLEAR
2007
Springer
180views Biometrics» more  CLEAR 2007»
15 years 10 months ago
Joint Bayesian Tracking of Head Location and Pose from Low-Resolution Video
Abstract. This paper presents a visual particle filter for jointly tracking the position of a person and her head pose. The resulting information may be used to support automatic ...
Oswald Lanz, Roberto Brunelli
IBPRIA
2007
Springer
15 years 10 months ago
Known Unknowns: Novelty Detection in Condition Monitoring
In time-series analysis it is often assumed that observed data can be modelled as being derived from a number of regimes of dynamics, as e.g. in a Switching Kalman Filter (SKF) [1,...
John A. Quinn, Christopher K. I. Williams