Sciweavers

2236 search results - page 135 / 448
» Intrusion detection techniques and approaches
Sort
View
91
Voted
ICIP
2007
IEEE
15 years 4 months ago
Motion Detection using a Model of Visual Attention
Motion detection and estimation are known to be important in many automated surveillance systems. It has drawn significant research interest in the field of computer vision. This ...
Shijie Zhang, Fred Stentiford
86
Voted
ICASSP
2011
IEEE
14 years 2 months ago
cROVER: Improving ROVER using automatic error detection
Recognizer Output Voting Error Reduction (ROVER), is a well-known procedure for decoders’ combination aiming at reducing the Word Error Rate (WER) in transcription applications....
Kacem Abida, Fakhri Karray, Wafa Abida
120
Voted
CG
2008
Springer
14 years 10 months ago
Parallel techniques for physically based simulation on multi-core processor architectures
As multi-core processor systems become more and more widespread, the demand for efficient parallel algorithms also propagates into the field of computer graphics. This is especial...
Bernhard Thomaszewski, Simon Pabst, Wolfgang Bloch...
ISCAS
2003
IEEE
91views Hardware» more  ISCAS 2003»
15 years 3 months ago
Variable delay ripple carry adder with carry chain interrupt detection
Various implementations are known for the efficient implementation of adders. As opposed to traditional optimization techniques a statistical approach using early termination det...
Andreas Burg, Frank K. Gürkaynak, Hubert Kaes...
70
Voted
ICPR
2008
IEEE
15 years 4 months ago
A new edge-based text verification approach for video
In this paper, we propose a new edge-based text verification approach for video. Based on the investigation of the relation between candidate blocks and their neighbor areas, the ...
Jing Zhang, Dmitry B. Goldgof, Rangachar Kasturi