Sciweavers

165 search results - page 13 / 33
» Soft computing in intrusion detection: the state of the art
Sort
View
BMVC
2010
14 years 9 months ago
Detection of Curves with Unknown Endpoints using Minimal Path Techniques
We present a novel method to detect curves with unknown endpoints using minimal path techniques. Our work builds on the state of the art minimal path techniques currently used to ...
Vivek Kaul, Yichang Tsai, Anthony J. Yezzi
COMSIS
2007
80views more  COMSIS 2007»
14 years 11 months ago
"Security of Computer Systems and Networks" Book Preview
This paper presents preview of the new book titled “Security of Computer Systems and Networks” (original in Serbian language “Sigurnost računarskih sistema i mreža”) – ...
Dragan Pleskonjic, Nemanja Macek, Borislav Djordje...
IVC
2006
227views more  IVC 2006»
14 years 11 months ago
Automatic registration of overlapping 3D point clouds using closest points
While the SoftAssign algorithm imposes a two-way constraint embedded into the deterministic annealing scheme and the EMICP algorithm imposes a one-way constraint, they represent t...
Yonghuai Liu
ICPR
2006
IEEE
16 years 23 days ago
Modelling Crowd Scenes for Event Detection
This work presents an automatic technique for detection of abnormal events in crowds. Crowd behaviour is difficult to predict and might not be easily semantically translated. More...
Ernesto L. Andrade, Robert B. Fisher, Scott Blunsd...
ICCV
2011
IEEE
13 years 11 months ago
Tabula Rasa: Model Transfer for Object Category Detection
Our objective is transfer training of a discriminatively trained object category detector, in order to reduce the number of training images required. To this end we propose three ...
Yusuf Aytar, Andrew Zisserman