Sciweavers

5924 search results - page 66 / 1185
» Normal Process Representatives
Sort
View
104
Voted
IMF
2007
15 years 2 months ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay
139
Voted

Source Code
7589views
16 years 8 months ago
MATLAB and Octave Functions for Computer Vision and Image Processing
Great Matlab and Octave function implementation for hot computer vision algorithms such as Feature detection via Phase Congruency, Spatial feature detection, Non-maxima suppression...
P. D. Kovesi
99
Voted
ICCV
2011
IEEE
14 years 18 days ago
Delta-Dual Hierarchical Dirichlet Processes: A pragmatic abnormal behaviour detector
In the security domain a key problem is identifying rare behaviours of interest. Training examples for these behaviours may or may not exist, and if they do exist there will be fe...
Tom Haines, Queen Mary, Tao Xiang
86
Voted
INTERSPEECH
2010
14 years 7 months ago
Context adaptive training with factorized decision trees for HMM-based speech synthesis
To achieve natural high quality synthesised speech in HMMbased speech synthesis, the effective modelling of complex acoustic and linguistic contexts is critical. Traditional appro...
Kai Yu, Heiga Zen, François Mairesse, Steve...
VIS
2007
IEEE
152views Visualization» more  VIS 2007»
16 years 1 months ago
An Effective Illustrative Visualization Framework Based on Photic Extremum Lines (PELs)
Conveying shape using feature lines is an important visualization tool in visual computing. The existing feature lines (e.g., ridges, valleys, silhouettes, suggestive contours, etc...
Xuexiang Xie, Ying He, Feng Tian, Hock-Soon Sea...