Sciweavers

704 search results - page 125 / 141
» Exploiting Data Missingness in Bayesian Network Modeling
Sort
View
111
Voted
CONEXT
2010
ACM
14 years 9 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
166
Voted
CVPR
2010
IEEE
14 years 7 months ago
Curious snakes: A minimum latency solution to the cluttered background problem in active contours
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedd...
Ganesh Sundaramoorthi, Stefano Soatto, Anthony J. ...
80
Voted
PR
2006
112views more  PR 2006»
14 years 10 months ago
Understanding gestures with systematic variations in movement dynamics
Sign language communication includes not only lexical sign gestures but also grammatical processes which represent inflections through systematic variations in sign appearance. We...
Sylvie C. W. Ong, Surendra Ranganath, Yedatore Ven...
IBERAMIA
2010
Springer
14 years 9 months ago
A Visual Grammar for Face Detection
Several methods have been developed for face detection with certain success, however these tend to fail under difficult conditions such as partial occlusions and changes in orienta...
Augusto Meléndez, Luis Enrique Sucar, Eduar...
SDM
2008
SIAM
105views Data Mining» more  SDM 2008»
15 years 9 days ago
Gaussian Process Learning for Cyber-Attack Early Warning
Network security has been a serious concern for many years. For example, firewalls often record thousands of exploit attempts on a daily basis. Network administrators could benefi...
Jian Zhang 0004, Phillip A. Porras, Johannes Ullri...