Sciweavers

1281 search results - page 176 / 257
» Isolated Features Detection in Feature Models
Sort
View
138
Voted
AIRS
2010
Springer
14 years 10 months ago
Event Recognition from News Webpages through Latent Ingredients Extraction
We investigate the novel problem of event recognition from news webpages. "Events" are basic text units containing news elements. We observe that a news article is always...
Rui Yan, Yu Li, Yan Zhang, Xiaoming Li
111
Voted
ICCV
2011
IEEE
14 years 20 days ago
What Characterizes a Shadow Boundary under the Sun and Sky?
Despite decades of study, robust shadow detection remains difficult, especially within a single color image. We describe a new approach to detect shadow boundaries in images of o...
Xiang Huang, Gang Hua, Jack Tumblin, Lance William...
CVPR
1998
IEEE
16 years 2 months ago
Action Recognition Using Probabilistic Parsing
A new approach to the recognition of temporal behaviors and activities is presented. The fundamental idea, inspired by work in speech recognition, is to divide the inference probl...
Aaron F. Bobick, Yuri A. Ivanov
112
Voted
CHARME
2005
Springer
122views Hardware» more  CHARME 2005»
15 years 6 months ago
Regular Vacuity
The application of model-checking tools to complex systems involves a nontrivial step of modelling the system by a finite-state model and a translation of the desired properties i...
Doron Bustan, Alon Flaisher, Orna Grumberg, Orna K...
DIMVA
2008
15 years 2 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...