Sciweavers

3524 search results - page 638 / 705
» Issues in Active Databases
Sort
View
KDD
2012
ACM
168views Data Mining» more  KDD 2012»
13 years 2 months ago
Mining contentions from discussions and debates
Social media has become a major source of information for many applications. Numerous techniques have been proposed to analyze network structures and text contents. In this paper,...
Arjun Mukherjee, Bing Liu 0001
VCIP
2000
128views Communications» more  VCIP 2000»
15 years 1 months ago
Video Quality Experts Group: current results and future directions
Subjective assessment methods have been used reliably for many years to evaluate video quality. They continue to provide the most reliable assessments compared to objective method...
Ann M. Rohaly, Philip J. Corriveau, John M. Libert...
ECCV
2002
Springer
16 years 1 months ago
Tracking and Object Classification for Automated Surveillance
In this paper we discuss the issues that need to be resolved before fully automated outdoor surveillance systems can be developed, and present solutions to some of these problems. ...
Omar Javed, Mubarak Shah
ICPR
2004
IEEE
16 years 29 days ago
3D Face Pose Tracking From an Uncalibrated Monocular Camera
ct We propose a new near-real time technique for 3D face pose tracking from a monocular image sequence obtained from an uncalibrated camera. The basic idea behind our approach is t...
Qiang Ji, Zhiwei Zhu
SIGSOFT
2003
ACM
16 years 18 days ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz