Sciweavers

5330 search results - page 1051 / 1066
» The Performability Tool P'ility
Sort
View
RAID
2010
Springer
15 years 8 days ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
TIP
2010
312views more  TIP 2010»
15 years 7 days ago
A Novel Multiresolution Spatiotemporal Saliency Detection Model and Its Applications in Image and Video Compression
—Salient areas in natural scenes are generally regarded as areas which the human eye will typically focus on, and finding these areas is the key step in object detection. In com...
Chenlei Guo, Liming Zhang
111
Voted
TOMACS
2010
182views more  TOMACS 2010»
15 years 7 days ago
State-dependent importance sampling for a Jackson tandem network
This paper considers importance sampling as a tool for rare-event simulation. The focus is on estimating the probability of overflow in the downstream queue of a Jacksonian two-n...
Denis I. Miretskiy, Werner R. W. Scheinhardt, Mich...
BMVC
2010
14 years 12 months ago
Background Modelling on Tensor Field for Foreground Segmentation
The paper proposes a new method to perform foreground detection by means of background modeling using the tensor concept. Sometimes, statistical modelling directly on image values...
Rui Caseiro, Jorge Batista, Pedro Martins
EMNLP
2010
14 years 12 months ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
« Prev « First page 1051 / 1066 Last » Next »