Sciweavers

6388 search results - page 1252 / 1278
» High Performance Data Mining
Sort
View
CVPR
2008
IEEE
16 years 6 months ago
Small codes and large image databases for recognition
The Internet contains billions of images, freely available online. Methods for efficiently searching this incredibly rich resource are vital for a large number of applications. Th...
Antonio B. Torralba, Robert Fergus, Yair Weiss
ECCV
2008
Springer
16 years 6 months ago
Simultaneous Detection and Registration for Ileo-Cecal Valve Detection in 3D CT Colonography
Object detection and recognition has achieved a significant progress in recent years. However robust 3D object detection and segmentation in noisy 3D data volumes remains a challen...
Le Lu, Adrian Barbu, Matthias Wolf, Jianming Liang...
ICIP
2002
IEEE
16 years 5 months ago
Efficient video similarity measurement with video signature
The proliferation of video content on the web makes similarity detection an indispensable tool in web data management, searching, and navigation. In this paper, we propose a numbe...
Sen-Ching S. Cheung, Avideh Zakhor
ICDE
2007
IEEE
193views Database» more  ICDE 2007»
16 years 5 months ago
Categorization and Optimization of Synchronization Dependencies in Business Processes
requirement. Furthermore, programming using sequence constructs normally produce nested structures and The current approachfor modeling synchronization in scattered code, especiall...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
SIGSOFT
2004
ACM
16 years 4 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
« Prev « First page 1252 / 1278 Last » Next »