Sciweavers

1281 search results - page 90 / 257
» Isolated Features Detection in Feature Models
Sort
View
133
Voted
MICCAI
2010
Springer
15 years 1 months ago
Morphology-Guided Graph Search for Untangling Objects: C. elegans Analysis
We present a novel approach for extracting cluttered objects based on their morphological properties1 . Specifically, we address the problem of untangling C. elegans clusters in h...
Tammy Riklin Raviv, Vebjorn Ljosa, Annie L. Conery...
AIPRF
2008
15 years 4 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
ISMIS
2005
Springer
15 years 8 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
103
Voted
WMCSA
2000
IEEE
15 years 7 months ago
Adapting to mobile contexts with user-interface modeling
Mobile computing offers the possibility of dramatically expanding the versatility of computers, by bringing them off the desktop and into new and unique contexts. However, this ne...
Jacob Eisenstein, Jean Vanderdonckt, Angel R. Puer...
ICCV
2005
IEEE
16 years 5 months ago
Identifying Individuals in Video by Combining "Generative" and Discriminative Head Models
The objective of this work is automatic detection and identification of individuals in unconstrained consumer video, given a minimal number of labelled faces as training data. Whi...
Mark Everingham, Andrew Zisserman