Sciweavers

603 search results - page 18 / 121
» Efficient neighborhood-based computations on regions using s...
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
CVPR
2009
IEEE
15 years 4 months ago
Sigma Set: A small second order statistical region descriptor
Given an image region of pixels, second order statistics can be used to construct a descriptor for object representation. One example is the covariance matrix descriptor, which sh...
Xiaopeng Hong, Hong Chang, Shiguang Shan, Xilin Ch...
AINA
2007
IEEE
15 years 1 months ago
Uniformity and Efficiency of a Wireless Sensor Network's Coverage
Abstract-- The primary contribution of this paper is in a wireless sensor network's coverage analysis method, which focuses on both the coverage itself and its uniformity and ...
Md. Ashiqur Rahman, Sajid Hussain
ICIP
2010
IEEE
14 years 7 months ago
Saliency detection using maximum symmetric surround
Detection of visually salient image regions is useful for applications like object segmentation, adaptive compression, and object recognition. Recently, full-resolution salient ma...
Radhakrishna Achanta, Sabine Süsstrunk
SGP
2004
15 years 5 days ago
Shape Segmentation Using Local Slippage Analysis
We propose a method for segmentation of 3D scanned shapes into simple geometric parts. Given an input point cloud, our method computes a set of components which possess one or mor...
Natasha Gelfand, Leonidas J. Guibas