|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13577 occurrences of 5667 keywords
|
|
|
Results
Found 19861 publication records. Showing 19861 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | Jeffrey E. Nelson, Jason G. Brown, Rao Desineni, R. D. (Shawn) Blanton |
Multiple-detect ATPG based on physical neighborhoods. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
N-detect, multiple-detect, ATPG, defects, neighborhoods |
45 | Stelios Neophytou, Maria K. Michael |
On the Relaxation of n-detect Test Sets. |
VTS |
2008 |
DBLP DOI BibTeX RDF |
N-detect, test set relaxation |
34 | Przemyslaw Mazurek |
Spatio-Temporal Track-Before-Detect Algorithm for Interlaced and Progressive Scan Imaging Sensors. |
ICCVG |
2008 |
DBLP DOI BibTeX RDF |
Track-Before-Detect, Interlaced Sensors, Image Processing, Imaging Sensors |
34 | Przemyslaw Mazurek |
Estimation Track-Before-Detect Motion Capture Systems State Space Spatial Component. |
CAIP |
2007 |
DBLP DOI BibTeX RDF |
Track-Before-Detect, Motion Capture, Estimation |
31 | Jun Shi, Booma Devi Sekar, Ming-Chui Dong, Wai Kei Lei |
Fuzzy Neural Networks to Detect Cardiovascular Diseases Hierarchically. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
detect cardiovascular disease, variance analysis, confidence coefficient, cubic interpolation, hierarchical fuzzy neural networks, membership function |
28 | Sameer Goel, Rubin A. Parekhji |
Choosing the Right Mix of At-speed Structural Test Patterns: Comparisons in Pattern Volume Reduction and Fault Detection Efficiency. |
Asian Test Symposium |
2005 |
DBLP DOI BibTeX RDF |
delay fault simulation, N-detect coverage metrics, Delay fault test, test optimizations |
28 | Hyun Seop Bae, Yong Rae Kwon, Hyeon Soo Kim |
An Efficient Debugging Method for Message-based Parallel Programs using Static Analysis Information. |
APSEC |
1995 |
DBLP DOI BibTeX RDF |
language-based replay, MHB(Minimal Happened Before) model, Detect and Reproduce method, parallel program, static analysis, debugging, probe effects, nondeterminacy, event ordering |
28 | Yen-Tzu Lin, Osei Poku, Naresh K. Bhatti, Ronald D. Blanton |
Physically-Aware N-Detect Test Pattern Selection. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Toshiya Nakakura, Yasuyuki Sumi, Toyoaki Nishida |
Neary: conversation field detection based on similarity of auditory situation. |
HotMobile |
2009 |
DBLP DOI BibTeX RDF |
conversation field detect, user context |
25 | Lei Gao, Chao Li 0001, Chengjun Zhu, Zhang Xiong 0001 |
A Motion Compensated De-interlacing Algorithm for Motive Object Capture. |
HCI (12) |
2007 |
DBLP DOI BibTeX RDF |
de-interlacing, motion object, motion estimation, motion compensation, motion detect |
23 | Xiao-xing Gao, Chun-ze Zhao, Gui-Ran Chang, Zhen-hua Tan |
Design and Implementation of Drill Hole of PCB Detection System. |
HIS (2) |
2009 |
DBLP DOI BibTeX RDF |
PCB detection, drill Hole detect, digital image processing |
23 | MyeongGyu Jeong, Toru Nakura, Makoto Ikeda, Kunihiro Asada |
Moebius circuit: dual-rail dynamic logic for logic gate level pipeline with error gate search feature. |
ACM Great Lakes Symposium on VLSI |
2009 |
DBLP DOI BibTeX RDF |
dcvsl, high speed digital, pipeline, error detect, soft error |
23 | Chih-Min Chen, Yu-Cheng Wang, Hsiang-An Wang, Chih-Yi Chiu |
Digital Video Retrieval via Mobile Devices. |
eScience |
2008 |
DBLP DOI BibTeX RDF |
Content-based retrieval, mobile search, shot change detect |
23 | Catalin Stoean, Mike Preuss, Ruxandra Stoean, Dumitru Dumitrescu |
EA-Powered Basin Number Estimation by Means of Preservation and Exploration. |
PPSN |
2008 |
DBLP DOI BibTeX RDF |
detect-multimodal mechanism, function optimization, Multimodal optimization, basins of attraction |
23 | Youngjae Kim 0002, Youmin Kim, Minsoo Hahn |
Detecting Driver Fatigue based on the Driver. |
ISUC |
2008 |
DBLP DOI BibTeX RDF |
sleepy, behavior pattern recognition, detect, automotive, vehicle, driving, car, fatigue, drowsy |
23 | Tim Menzies, Jeremy Greenwald, Art Frank |
Data Mining Static Code Attributes to Learn Defect Predictors. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
Data mining detect prediction, McCabe, Halstead, artifical intelligence, naive Bayes, empirical |
23 | Catalin Stoean, Mike Preuss, Ruxandra Stoean, Dumitru Dumitrescu |
Disburdening the species conservation evolutionary algorithm of arguing with radii. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
detect-multimodal mechanism, multimodal evolutionary algorithms, species conservation, hybridization |
23 | Ho-fung Leung, Hing-Fung Ting |
An Optimal Algorithm for Global Termination Detection in Shared-Memory Asynchronous Multiprocessor Systems. |
IEEE Trans. Parallel Distributed Syst. |
1997 |
DBLP DOI BibTeX RDF |
optimality, Termination detect, shared-memory multiprocessor systems |
22 | Sudhakar M. Reddy, Irith Pomeranz, Chen Liu |
On tests to detect via opens in digital CMOS circuits. |
DAC |
2008 |
DBLP DOI BibTeX RDF |
constrained stuck-at tests, test generation, DFT, open defects |
20 | Marius Bulgaru, Sorin Bilegan, Laura Grindei |
E-DETECT - Virtual Platform for Education in Computed Tomography. |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jae-Gil Lee 0001, Jiawei Han 0001, Xiaolei Li 0001 |
Trajectory Outlier Detection: A Partition-and-Detect Framework. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Junyao Gao, Xueshan Gao, Wei Zhu 0013, Jianguo Zhu 0002, Boyu Wei |
Coal Mine Detect and Rescue Robot Design and Research. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ding-Jie Huang, Wei-Chung Teng |
A Gait Based Approach to Detect Directional Bias of Four-Legged Robots' Direct Walking Utilizing Acceleration Sensors. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
four-legged robot, directional bias, accelerometer, gait |
20 | Jiaqi Wang, Chengqi Zhang, Xindong Wu 0001, Hongwei Qi, Jue Wang |
SVM-OD: SVM Method to Detect Outliers. |
Foundations and Novel Approaches in Data Mining |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon |
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. |
GCC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Irith Pomeranz, Sudhakar M. Reddy, Sandip Kundu |
On the characterization and efficient computation of hard-to-detect bridging faults. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Srikanth Venkataraman, Srihari Sivaraj, M. Enamul Amyeen, Sangbong Lee, Ajay Ojha, Ruifeng Guo |
An Experimental Study of N-Detect Scan ATPG Patterns on a Processor. |
VTS |
2004 |
DBLP DOI BibTeX RDF |
|
20 | M. Enamul Amyeen, Srikanth Venkataraman, Ajay Ojha, Sangbong Lee |
Evaluation of the Quality of N-Detect Scan ATPG Patterns on a Processor. |
ITC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Meng Zhang, Lili Dong, Changzhi Tian |
DTD: "Detect-Track-Detect" Method for Infrared Marine Object Detection. |
IEEE Geosci. Remote. Sens. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Johan Edstedt, Georg Bökman, Mårten Wadenbäck, Michael Felsberg |
DeDoDe: Detect, Don't Describe - Describe, Don't Detect for Local Feature Matching. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Jiarui Xu, Lianjun Li 0001, Lizhong Zheng, Lingjia Liu 0001 |
Learn to Detect and Detect to Learn: Structure Learning and Decision Feedback for MIMO-OFDM Receive Processing. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Dhruvisha Mondhe, Rutuja Patil, Vaishnavi Jadhav, Priyal Agarwal, Lifna Cs |
Sign Detect: An app to detect sign language. |
MetroXRAINE |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas Dimeglio, Sebastien Romano, Alexandre Vesseron, Vincent Pelegrin, Samir Ouchani |
COVID-DETECT: A Deep Learning Based Approach to Accelerate COVID-19 Detection. |
MEDI Workshops |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Naser Damer, Alexandra Mosegui Saladie, Steffen Zienert, Yaza Wainakh, Philipp Terhörst, Florian Kirchbuchner, Arjan Kuijper |
To Detect or not to Detect: The Right Faces to Morph. |
ICB |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Christian Servin, Olga Kosheleva, Vladik Kreinovich |
How to Detect Crisp Sets Based on Subsethood Ordering of Normalized Fuzzy Sets? How to Detect Type-1 Sets Based on Subsethood Ordering of Normalized Interval-Valued Fuzzy Sets? |
FUZZ-IEEE |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Christoph Feichtenhofer, Axel Pinz, Andrew Zisserman |
Detect to Track and Track to Detect. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
17 | Christoph Feichtenhofer, Axel Pinz, Andrew Zisserman |
Detect to Track and Track to Detect. |
ICCV |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jonas Krinitz, Simon Alfano, Dirk Neumann 0001 |
How The Market Can Detect Its Own Mispricing - A Sentiment Index To Detect Irrational Exuberance. |
HICSS |
2017 |
DBLP BibTeX RDF |
|
17 | Fanchen Zhang, Micah Thornton, Jennifer Dworak |
When Optimized N-Detect Test Sets are Biased: An Investigation of Cell-Aware-Type Faults and N-Detect Stuck-At ATPG. |
NATW |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Ajay Chandra V. Gummalla, John O. Limb |
Wireless Collision Detect (WCD): Multiple Access with Receiver Initiated Feedback and Carrier Detect Signal. |
ICC (1) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici |
Using artificial neural networks to detect unknown computer worms. |
Neural Comput. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Feature selection, Artificial neural networks, Worm detection, HIDS |
17 | Yoshimasa Ohmoto, Takashi Miyake, Toyoaki Nishida |
A Method to Detect an Atmosphere of "Involvement, Enjoyment, and/or Excitement" in Multi-user Interaction. |
IVA |
2009 |
DBLP DOI BibTeX RDF |
physiological indices, affective interaction, multi-user interaction |
17 | Jungsuk Song, Hiroki Takakura, Yongjin Kwon |
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Hanli Wang, Sam Kwong |
Hybrid Model to Detect Zero Quantized DCT Coefficients in H.264. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zsolt Kira |
Modeling cross-sensory and sensorimotor correlations to detect and localize faults in mobile robots. |
IROS |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Elisa Bertino, Ashish Kamra, James P. Early |
Profiling Database Application to Detect SQL Injection Attacks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Hongxun Liu, José G. Delgado-Frias, Sirisha Medidi |
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Kalyana R. Kantipudi, Vishwani D. Agrawal |
A Reduced Complexity Algorithm for Minimizing N-Detect Tests. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Roger Les Cottrell, Connie Logg, Mahesh Chhapparia, Maxim Grigoriev, Felipe Haro, Fawad Nazir, Mark Sandford |
Evaluation of Techniques to Detect Significant Network Performance Problems using End-to-End Active Network Measurements. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada |
ACTM: Anomaly Connection Tree Method to detect Silent Worms. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | James D. Jones |
Using Logic Programming to Detect Deception on the Basis of Actions. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Minerals: using data mining to detect router misconfigurations. |
MineNet |
2006 |
DBLP DOI BibTeX RDF |
network misconfiguration, static analysis, association rules mining, routers |
17 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. |
FSKD (1) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Cem Ünsalan, Kim L. Boyer |
A System to Detect Houses and Residential Street Networks in Multispectral Satellite Images. |
ICPR (3) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Danny Hesse, Jana Dittmann, Andreas Lang 0001 |
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. |
EUROMICRO |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Brady Benware, Chris Schuermyer, Sreenevasan Ranganathan, Robert Madge, Prabhu Krishnamurthy, Nagesh Tamarapalli, Kun-Han Tsai, Janusz Rajski |
Impact of Multiple-Detect Test Patterns on Product Quality. |
ITC |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Keith D. Cooper, Li Xu |
An efficient static analysis algorithm to detect redundant memory operations. |
MSP/ISMM |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Ajay D. Kshemkalyani, Mukesh Singhal |
A One-Phase Algorithm to Detect Distributed Deadlocks in Replicated Databases. |
IEEE Trans. Knowl. Data Eng. |
1999 |
DBLP DOI BibTeX RDF |
generalized deadlock, Distributed database, replicated database, graph reduction, quorum consensus |
17 | Heidrun Engel |
Data flow transformations to detect results which are corrupted by hardware faults. |
HASE |
1996 |
DBLP DOI BibTeX RDF |
data flow transformations, corrupt result detection, hardware fault coverage, modified instruction, diverse data representation, modified instruction sequences, assembler level, high language level, fault tolerant computing, software faults, design diversity, hardware fault detection |
16 | Zouheir Trabelsi, Hamza Rahmani |
Detection of Sniffers in an Ethernet Network. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Irith Pomeranz, Sudhakar M. Reddy |
Test Compaction for Synchronous Sequential Circuits by Test Sequence Recycling. |
Great Lakes Symposium on VLSI |
1998 |
DBLP DOI BibTeX RDF |
dynamic test compaction, synchronous sequential circuits, static test compaction |
16 | Luca Simoncini, Arthur D. Friedman |
Incomplete Fault Coverage In Modular Miltiprocessor Systems. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
|
14 | Sébastien Macé, Hervé Locteau, Ernest Valveny, Salvatore Tabbone |
A system to detect rooms in architectural floor plan images. |
Document Analysis Systems |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Dominique Michelucci, Pascal Schreck, Simon E. B. Thierry, Christoph Fünfzig, Jean-David Génevaux |
Using the witness method to detect rigid subsystems of geometric constraints in CAD. |
Symposium on Solid and Physical Modeling |
2010 |
DBLP DOI BibTeX RDF |
W-decomposition, rigidity theory, witness configuration, geometric constraints solving, Jacobian matrix |
14 | Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
A topological approach to detect conflicts in firewall policies. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali |
Honeybee-Based Model to Detect Intrusion. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
honeybee, intrusion detection, network security, natural computing |
14 | Javad Vazifehdan, Ramin Hekmat |
Performance Evaluation of multi-hop Detect-and-Forward and Amplify-and-Forward wireless transmission systems. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou |
Using likely program invariants to detect hardware errors. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang 0003 |
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
multiple detectors, Wireless mesh network, MAC layer, selfish node |
14 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Tudor Gîrba, Stéphane Ducasse, Adrian Kuhn, Radu Marinescu 0001, Daniel Ratiu |
Using concept analysis to detect co-change patterns. |
IWPSE |
2007 |
DBLP DOI BibTeX RDF |
co-change analysis, evolution analysis, concept analysis |
14 | Syed A. Khayam, Hayder Radha |
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jalel Rejeb, Mahalakshmi Srinivasan |
Extension of Aho-Corasick Algorithm to Detect Injection Attacks. |
SCSS (1) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mingwu Zhang, Bo Yang 0003, Yu Qi, Wenzheng Zhang |
Using Trust Metric to Detect Malicious Behaviors in WSNs. |
SNPD (3) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli |
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. |
Web Intelligence/IAT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jian-Yun Lai, Yan-Ting Chen, Te-Heng Wang, Hong-Si Chang, Jui-Lin Lai |
Biosensor Integrated with Transducer to Detect the Glucose. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Joaquín Salas, Hugo Jiménez-Hernández, José-Joel González-Barbosa, Juan-Bautista Hurtado-Ramos, Sandra Canchola |
A Double Layer Background Model to Detect Unusual Events. |
ACIVS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Darong Huang, Xiyue Huang, Changcheng Xiang, Wei Li, Yin Zhang |
The Covariance Constraint Control Method of Fault Detect for Complicated Systems. |
ICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yang Feng, Senlin Luo, Limin Pan |
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template. |
PCM |
2006 |
DBLP DOI BibTeX RDF |
extensive detection, correlative detection, digital watermarking |
14 | Tomohiko Ohtsuka, Akiyoshi Kondo |
A new approach to detect core and delta of the fingerprint using extended relational graph. |
ICIP (3) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Lei Qu, Ning Wang 0012, W. Lewis Johnson |
Using Learner Focus of Attention to Detect Learner Motivation Factors. |
User Modeling |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Cathal Seoighe, Konrad Scheffler |
Very Low Power to Detect Asymmetric Divergence of Duplicated Genes. |
Comparative Genomics |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Santosh Biswas, P. Srikanth, R. Jha, Siddhartha Mukhopadhyay, Amit Patra, Dipankar Sarkar 0001 |
On-Line Testing of Digital Circuits for n-Detect and Bridging Fault Models. |
Asian Test Symposium |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Nicholas Lesica, Garrett B. Stanley |
An LGN Inspired Detect/Transmit Framework for High Fidelity Relay of Visual Information with Limited Bandwidth. |
BVAI |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. |
HIP |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David R. Martin 0001, Charless C. Fowlkes, Jitendra Malik |
Learning to Detect Natural Image Boundaries Using Local Brightness, Color, and Texture Cues. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2004 |
DBLP DOI BibTeX RDF |
cue combination, ground truth segmentation data set, boundary localization, Texture, supervised learning, boundary detection, natural images |
14 | Yi Li, Zhiyan Wang, Haizan Zeng |
Correlation Filter: An Accurate Approach to Detect and Locate Low Contrast Character Strings in Complex Table Environment. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Shivani Agarwal 0001, Aatif Awan, Dan Roth |
Learning to Detect Objects in Images via a Sparse, Part-Based Representation. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2004 |
DBLP DOI BibTeX RDF |
machine learning, image representation, Object detection, evaluation/methodology |
14 | Xiangrong Wang, Jun Xu, Christopher H. Pham |
An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior. |
ISSRE |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Haizhi Xu, Wenliang Du, Steve J. Chapin |
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif |
Abnormality Metrics to Detect and Protect against Network Attacks. |
ICPS |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jeffrey Ng, Anil A. Bharath |
Steering in Scale Space to Optimally Detect Image Structures. |
ECCV (1) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Arun Lakhotia, Eric Uday Kumar |
Abstracting Stack to Detect Obfuscated Calls in Binaries. |
SCAM |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Irith Pomeranz, Sudhakar M. Reddy, Sandip Kundu |
On the Characterization of Hard-to-Detect Bridging Faults. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 19861 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|