Sciweavers

5924 search results - page 66 / 1185
» Normal Process Representatives
Sort
View
123
Voted
IMF
2007
15 years 3 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay
165
Voted

Source Code
7589views
16 years 10 months ago
MATLAB and Octave Functions for Computer Vision and Image Processing
Great Matlab and Octave function implementation for hot computer vision algorithms such as Feature detection via Phase Congruency, Spatial feature detection, Non-maxima suppression...
P. D. Kovesi
ICCV
2011
IEEE
14 years 2 months ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
INTERSPEECH
2010
14 years 9 months ago
Context adaptive training with factorized decision trees for HMM-based speech synthesis
To achieve natural high quality synthesised speech in HMMbased speech synthesis, the effective modelling of complex acoustic and linguistic contexts is critical. Traditional appro...
Kai Yu, Heiga Zen, François Mairesse, Steve...
VIS
2007
IEEE
152views Visualization» more  VIS 2007»
16 years 3 months ago
An Effective Illustrative Visualization Framework Based on Photic Extremum Lines (PELs)
Conveying shape using feature lines is an important visualization tool in visual computing. The existing feature lines (e.g., ridges, valleys, silhouettes, suggestive contours, etc...
Xuexiang Xie, Ying He, Feng Tian, Hock-Soon Sea...