Sciweavers

33 search results - page 6 / 7
» Labeled VoIP Data-Set for Intrusion Detection Evaluation
Sort
View
KDD
1994
ACM
125views Data Mining» more  KDD 1994»
15 years 1 months ago
Knowledge Discovery in Large Image Databases: Dealing with Uncertainties in Ground Truth
This paper discusses the problem of knowledge discovery in image databases with particular focus on the issues which arise when absolute ground truth is not available. It is often...
Padhraic Smyth, Michael C. Burl, Usama M. Fayyad, ...
CVPR
2010
IEEE
15 years 5 months ago
Linked Edges as Stable Region Boundaries
Many of the recently popular shape based category recognition methods require stable, connected and labeled edges as input. This paper introduces a novel method to find the most st...
Michael Donoser, Hayko Riemenschneider and Horst B...
ICCV
2009
IEEE
16 years 2 months ago
Joint learning of visual attributes, object classes and visual saliency
We present a method to learn visual attributes (eg.“red”, “metal”, “spotted”) and object classes (eg. “car”, “dress”, “umbrella”) together. We assume imag...
Gang Wang, David Forsyth
ICIP
2010
IEEE
14 years 7 months ago
Robust segmentation of lung tissue in chest CT scanning
This paper deals with segmentation of the lung tissues from low dose CT (LDCT) scans of the chest. Goal is correct segmentation as well as maintaining the details of the lung regi...
Amal A. Farag, James Graham, Aly Farag
SIGMOD
2010
ACM
260views Database» more  SIGMOD 2010»
15 years 2 months ago
Towards proximity pattern mining in large graphs
Mining graph patterns in large networks is critical to a variety of applications such as malware detection and biological module discovery. However, frequent subgraphs are often i...
Arijit Khan, Xifeng Yan, Kun-Lung Wu