Sciweavers

2006 search results - page 378 / 402
» Heuristic Security-Testing Methods
Sort
View
165
Voted
CVPR
2010
IEEE
14 years 7 months ago
Curious snakes: A minimum latency solution to the cluttered background problem in active contours
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedd...
Ganesh Sundaramoorthi, Stefano Soatto, Anthony J. ...
108
Voted
BIOINFORMATICS
2011
14 years 5 months ago
Integrative network alignment reveals large regions of global network similarity in yeast and human
Motivation: High-throughput methods for detecting molecular interactions have produced large sets of biological network data with much more yet to come. Analogous to sequence alig...
Oleksii Kuchaiev, Natasa Przulj
CVPR
2008
IEEE
16 years 26 days ago
Probabilistic graph and hypergraph matching
We consider the problem of finding a matching between two sets of features, given complex relations among them, going beyond pairwise. Each feature set is modeled by a hypergraph ...
Ron Zass, Amnon Shashua
VIS
2009
IEEE
399views Visualization» more  VIS 2009»
16 years 1 days ago
Visual Human+Machine Learning
In this paper we describe a novel method to integrate interactive visual analysis and machine learning to support the insight generation of the user. The suggested approach combine...
Raphael Fuchs, Jürgen Waser, Meister Eduard GrÃ...
SIGSOFT
2004
ACM
15 years 11 months ago
Heuristic-guided counterexample search in FLAVERS
One of the benefits of finite-state verification (FSV) tools, such as model checkers, is that a counterexample is provided when the property cannot be verified. Not all counterexa...
Jianbin Tan, George S. Avrunin, Lori A. Clarke, Sh...