Sciweavers

3019 search results - page 496 / 604
» Visualizing Objects with Mirrors
Sort
View
VIROLOGY
2010
165views more  VIROLOGY 2010»
14 years 11 months ago
IpMorph: fingerprinting spoofing unification
Abstract. There is nowadays a wide range of TCP/IP stack identification tools that allow to easily recognize the operating system of foreseen targets. The object of this article is...
Guillaume Prigent, Florian Vichot, Fabrice Harroue...
ISBI
2011
IEEE
14 years 8 months ago
Sparse topological data recovery in medical images
For medical image analysis, the test statistic of the measurements is usually constructed at every voxels in space and thresholded to determine the regions of significant signals...
Moo K. Chung, Hyekyoung Lee, Peter T. Kim, Jong Ch...
CONIELECOMP
2011
IEEE
14 years 8 months ago
FPGA design and implementation for vertex extraction of polygonal shapes
This work focuses on developing systems of blocks in SIMULINK and VHDL to reuse on design of applications involving the recognition of polygonal objects. Usage of this work reduce...
Jorge Martínez-Carballido, Jorge Guevara-Es...
IJCV
2010
574views more  IJCV 2010»
15 years 2 months ago
Time-Delayed Correlation Analysis for Multi-Camera Activity Understanding
We propose a novel approach to understanding activities from their partial observations monitored through multiple non-overlapping cameras separated by unknown time gaps. In our...
Chen Change Loy, Tao Xiang, Shaogang Gong

Publication
363views
14 years 3 months ago
Detecting and Discriminating Behavioural Anomalies
This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempor...
Chen Change Loy, Tao Xiang, Shaogang Gong