Sciweavers

210 search results - page 37 / 42
» Logarithmic edge detection with applications
Sort
View
INFOCOM
2000
IEEE
15 years 1 months ago
Network Border Patrol
Abstract—The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. However, end-to-end congestion control algorithms alone ar...
Célio Albuquerque, Brett J. Vickers, Tatsuy...
KDD
1997
ACM
161views Data Mining» more  KDD 1997»
15 years 1 months ago
Automated Discovery of Active Motifs in Three Dimensional Molecules
In this paper 1 we present a method for discovering approximately common motifs (also known as active motifs) in three dimensional (3D) molecules. Each node in a molecule is repre...
Xiong Wang, Jason Tsong-Li Wang, Dennis Shasha, Br...
ICDCS
2010
IEEE
15 years 1 months ago
Are Your Hosts Trading or Plotting? Telling P2P File-Sharing and Bots Apart
—Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-andcontrol. Despite the commonality of their substrates, we show that the different g...
Ting-Fang Yen, Michael K. Reiter
AMDO
2006
Springer
15 years 1 months ago
Combined Head, Lips, Eyebrows, and Eyelids Tracking Using Adaptive Appearance Models
The ability to detect and track human heads and faces in video sequences is useful in a great number of applications, such as human-computer interaction and gesture recognition. Re...
Fadi Dornaika, Javier Orozco, Jordi Gonzàle...
CVPR
2010
IEEE
14 years 11 months ago
Simultaneous Searching of Globally Optimal Interacting Surfaces with Shape Priors
Multiple surface searching with only image intensity information is a difficult job in the presence of high noise and weak edges. We present in this paper a novel method for global...
Qi Song, Xiaodong Wu, Yunlong Liu, Mona Garvin, Mi...