|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13577 occurrences of 5667 keywords
|
|
|
Results
Found 19861 publication records. Showing 19861 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
65 | Jeffrey E. Nelson, Jason G. Brown, Rao Desineni, R. D. (Shawn) Blanton |
Multiple-detect ATPG based on physical neighborhoods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 43rd Design Automation Conference, DAC 2006, San Francisco, CA, USA, July 24-28, 2006, pp. 1099-1102, 2006, ACM, 1-59593-381-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
N-detect, multiple-detect, ATPG, defects, neighborhoods |
45 | Stelios Neophytou, Maria K. Michael |
On the Relaxation of n-detect Test Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 26th IEEE VLSI Test Symposium (VTS 2008), April 27 - May 1, 2008, San Diego, California, USA, pp. 187-192, 2008, IEEE Computer Society, 978-0-7695-3123-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
N-detect, test set relaxation |
34 | Przemyslaw Mazurek |
Spatio-Temporal Track-Before-Detect Algorithm for Interlaced and Progressive Scan Imaging Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCVG ![In: Computer Vision and Graphics, International Conference, ICCVG 2008, Warsaw, Poland, November 10-12, 2008, Revised Papers, pp. 24-32, 2008, Springer, 978-3-642-02344-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Track-Before-Detect, Interlaced Sensors, Image Processing, Imaging Sensors |
34 | Przemyslaw Mazurek |
Estimation Track-Before-Detect Motion Capture Systems State Space Spatial Component. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAIP ![In: Computer Analysis of Images and Patterns, 12th International Conference, CAIP 2007, Vienna, Austria, August 27-29, 2007, Proceedings, pp. 149-156, 2007, Springer, 978-3-540-74271-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Track-Before-Detect, Motion Capture, Estimation |
31 | Jun Shi, Booma Devi Sekar, Ming-Chui Dong, Wai Kei Lei |
Fuzzy Neural Networks to Detect Cardiovascular Diseases Hierarchically. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 703-708, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
detect cardiovascular disease, variance analysis, confidence coefficient, cubic interpolation, hierarchical fuzzy neural networks, membership function |
28 | Sameer Goel, Rubin A. Parekhji |
Choosing the Right Mix of At-speed Structural Test Patterns: Comparisons in Pattern Volume Reduction and Fault Detection Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 330-336, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
delay fault simulation, N-detect coverage metrics, Delay fault test, test optimizations |
28 | Hyun Seop Bae, Yong Rae Kwon, Hyeon Soo Kim |
An Efficient Debugging Method for Message-based Parallel Programs using Static Analysis Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 2nd Asia-Pacific Software Engineering Conference (APSEC '95), December 6-9, 1995, Brisbane, Queensland, Australia, pp. 96-, 1995, IEEE Computer Society, 0-8186-7171-8. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
language-based replay, MHB(Minimal Happened Before) model, Detect and Reproduce method, parallel program, static analysis, debugging, probe effects, nondeterminacy, event ordering |
28 | Yen-Tzu Lin, Osei Poku, Naresh K. Bhatti, Ronald D. Blanton |
Physically-Aware N-Detect Test Pattern Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 634-639, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Toshiya Nakakura, Yasuyuki Sumi, Toyoaki Nishida |
Neary: conversation field detection based on similarity of auditory situation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotMobile ![In: Proceedings of the 10th Workshop on Mobile Computing Systems and Applications, HotMobile 2009, Santa Cruz, California, USA, February 23-24, 2009, 2009, ACM, 978-1-60558-283-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conversation field detect, user context |
25 | Lei Gao, Chao Li 0001, Chengjun Zhu, Zhang Xiong 0001 |
A Motion Compensated De-interlacing Algorithm for Motive Object Capture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (12) ![In: Digital Human Modeling, First International Conference on Digital Human Modeling, ICDHM 2007, Held as Part of HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, pp. 74-81, 2007, Springer, 978-3-540-73318-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
de-interlacing, motion object, motion estimation, motion compensation, motion detect |
23 | Xiao-xing Gao, Chun-ze Zhao, Gui-Ran Chang, Zhen-hua Tan |
Design and Implementation of Drill Hole of PCB Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (2) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 462-466, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PCB detection, drill Hole detect, digital image processing |
23 | MyeongGyu Jeong, Toru Nakura, Makoto Ikeda, Kunihiro Asada |
Moebius circuit: dual-rail dynamic logic for logic gate level pipeline with error gate search feature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Great Lakes Symposium on VLSI ![In: Proceedings of the 19th ACM Great Lakes Symposium on VLSI 2009, Boston Area, MA, USA, May 10-12 2009, pp. 177-180, 2009, ACM, 978-1-60558-522-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dcvsl, high speed digital, pipeline, error detect, soft error |
23 | Chih-Min Chen, Yu-Cheng Wang, Hsiang-An Wang, Chih-Yi Chiu |
Digital Video Retrieval via Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Fourth International Conference on e-Science, e-Science 2008, 7-12 December 2008, Indianapolis, IN, USA, pp. 376-377, 2008, IEEE Computer Society, 978-1-4244-3380-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Content-based retrieval, mobile search, shot change detect |
23 | Catalin Stoean, Mike Preuss, Ruxandra Stoean, Dumitru Dumitrescu |
EA-Powered Basin Number Estimation by Means of Preservation and Exploration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPSN ![In: Parallel Problem Solving from Nature - PPSN X, 10th International Conference Dortmund, Germany, September 13-17, 2008, Proceedings, pp. 569-578, 2008, Springer, 978-3-540-87699-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
detect-multimodal mechanism, function optimization, Multimodal optimization, basins of attraction |
23 | Youngjae Kim 0002, Youmin Kim, Minsoo Hahn |
Detecting Driver Fatigue based on the Driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISUC ![In: ISUC 2008, Second International Symposium on Universal Communication, Osaka, Japan, 15-16 December 2008, pp. 237-240, 2008, IEEE Computer Society, 978-0-7695-3433-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sleepy, behavior pattern recognition, detect, automotive, vehicle, driving, car, fatigue, drowsy |
23 | Tim Menzies, Jeremy Greenwald, Art Frank |
Data Mining Static Code Attributes to Learn Defect Predictors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 33(1), pp. 2-13, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Data mining detect prediction, McCabe, Halstead, artifical intelligence, naive Bayes, empirical |
23 | Catalin Stoean, Mike Preuss, Ruxandra Stoean, Dumitru Dumitrescu |
Disburdening the species conservation evolutionary algorithm of arguing with radii. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 1420-1427, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
detect-multimodal mechanism, multimodal evolutionary algorithms, species conservation, hybridization |
23 | Ho-fung Leung, Hing-Fung Ting |
An Optimal Algorithm for Global Termination Detection in Shared-Memory Asynchronous Multiprocessor Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 8(5), pp. 538-543, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
optimality, Termination detect, shared-memory multiprocessor systems |
22 | Sudhakar M. Reddy, Irith Pomeranz, Chen Liu |
On tests to detect via opens in digital CMOS circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 45th Design Automation Conference, DAC 2008, Anaheim, CA, USA, June 8-13, 2008, pp. 840-845, 2008, ACM, 978-1-60558-115-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
constrained stuck-at tests, test generation, DFT, open defects |
20 | Marius Bulgaru, Sorin Bilegan, Laura Grindei |
E-DETECT - Virtual Platform for Education in Computed Tomography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education ![In: Innovative Techniques in Instruction Technology, E-learning, E-assessment, and Education, Proceedings of the 2007 International Conference on Engineering Education, Instructional Technology, Assessment, and E-learning (EIAE 2007), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 315-320, 2008, Springer, 978-1-4020-8738-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jae-Gil Lee 0001, Jiawei Han 0001, Xiaolei Li 0001 |
Trajectory Outlier Detection: A Partition-and-Detect Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 140-149, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Junyao Gao, Xueshan Gao, Wei Zhu 0013, Jianguo Zhu 0002, Boyu Wei |
Coal Mine Detect and Rescue Robot Design and Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 780-785, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ding-Jie Huang, Wei-Chung Teng |
A Gait Based Approach to Detect Directional Bias of Four-Legged Robots' Direct Walking Utilizing Acceleration Sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 681-688, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
four-legged robot, directional bias, accelerometer, gait |
20 | Jiaqi Wang, Chengqi Zhang, Xindong Wu 0001, Hongwei Qi, Jue Wang |
SVM-OD: SVM Method to Detect Outliers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Foundations and Novel Approaches in Data Mining ![In: Foundations and Novel Approaches in Data Mining, pp. 129-141, 2006, Springer, 978-3-540-28315-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Jung-Taek Seo, Cheolho Lee, Taeshik Shon, Jongsub Moon |
SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings, pp. 59-70, 2005, Springer, 3-540-30510-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Irith Pomeranz, Sudhakar M. Reddy, Sandip Kundu |
On the characterization and efficient computation of hard-to-detect bridging faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(12), pp. 1640-1649, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Srikanth Venkataraman, Srihari Sivaraj, M. Enamul Amyeen, Sangbong Lee, Ajay Ojha, Ruifeng Guo |
An Experimental Study of N-Detect Scan ATPG Patterns on a Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 22nd IEEE VLSI Test Symposium (VTS 2004), 25-29 April 2004, Napa Valley, CA, USA, pp. 23-30, 2004, IEEE Computer Society, 0-7695-2134-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | M. Enamul Amyeen, Srikanth Venkataraman, Ajay Ojha, Sangbong Lee |
Evaluation of the Quality of N-Detect Scan ATPG Patterns on a Processor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2004 International Test Conference (ITC 2004), October 26-28, 2004, Charlotte, NC, USA, pp. 669-678, 2004, IEEE Computer Society, 0-7803-8581-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Meng Zhang, Lili Dong, Changzhi Tian |
DTD: "Detect-Track-Detect" Method for Infrared Marine Object Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Geosci. Remote. Sens. Lett. ![In: IEEE Geosci. Remote. Sens. Lett. 20, pp. 1-5, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Johan Edstedt, Georg Bökman, Mårten Wadenbäck, Michael Felsberg |
DeDoDe: Detect, Don't Describe - Describe, Don't Detect for Local Feature Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.08479, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Jiarui Xu, Lianjun Li 0001, Lizhong Zheng, Lingjia Liu 0001 |
Learn to Detect and Detect to Learn: Structure Learning and Decision Feedback for MIMO-OFDM Receive Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.09287, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Dhruvisha Mondhe, Rutuja Patil, Vaishnavi Jadhav, Priyal Agarwal, Lifna Cs |
Sign Detect: An app to detect sign language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MetroXRAINE ![In: IEEE International Conference on Metrology for Extended Reality, Artificial Intelligence and Neural Engineering, MetroXRAINE 2022, Rome, Italy, October 26-28, 2022, pp. 11-15, 2022, IEEE, 978-1-6654-8574-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas Dimeglio, Sebastien Romano, Alexandre Vesseron, Vincent Pelegrin, Samir Ouchani |
COVID-DETECT: A Deep Learning Based Approach to Accelerate COVID-19 Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MEDI Workshops ![In: Advances in Model and Data Engineering in the Digitalization Era - MEDI 2021 International Workshops: DETECT, SIAS, CSMML, BIOC, HEDA, Tallinn, Estonia, June 21-23, 2021, Proceedings, pp. 166-178, 2021, Springer, 978-3-030-87656-2. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Naser Damer, Alexandra Mosegui Saladie, Steffen Zienert, Yaza Wainakh, Philipp Terhörst, Florian Kirchbuchner, Arjan Kuijper |
To Detect or not to Detect: The Right Faces to Morph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: 2019 International Conference on Biometrics, ICB 2019, Crete, Greece, June 4-7, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-3640-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Christian Servin, Olga Kosheleva, Vladik Kreinovich |
How to Detect Crisp Sets Based on Subsethood Ordering of Normalized Fuzzy Sets? How to Detect Type-1 Sets Based on Subsethood Ordering of Normalized Interval-Valued Fuzzy Sets? ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUZZ-IEEE ![In: 2018 IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2018, Rio de Janeiro, Brazil, July 8-13, 2018, pp. 1-10, 2018, IEEE, 978-1-5090-6020-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Christoph Feichtenhofer, Axel Pinz, Andrew Zisserman |
Detect to Track and Track to Detect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1710.03958, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Christoph Feichtenhofer, Axel Pinz, Andrew Zisserman |
Detect to Track and Track to Detect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: IEEE International Conference on Computer Vision, ICCV 2017, Venice, Italy, October 22-29, 2017, pp. 3057-3065, 2017, IEEE Computer Society, 978-1-5386-1032-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Jonas Krinitz, Simon Alfano, Dirk Neumann 0001 |
How The Market Can Detect Its Own Mispricing - A Sentiment Index To Detect Irrational Exuberance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 50th Hawaii International Conference on System Sciences, HICSS 2017, Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017, pp. 1-10, 2017, ScholarSpace / AIS Electronic Library (AISeL). The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
17 | Fanchen Zhang, Micah Thornton, Jennifer Dworak |
When Optimized N-Detect Test Sets are Biased: An Investigation of Cell-Aware-Type Faults and N-Detect Stuck-At ATPG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NATW ![In: IEEE 23rd North Atlantic Test Workshop, NATW 2014, Johnson City, NY, USA, May 14-16, 2014, pp. 32-39, 2014, IEEE. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
17 | Ajay Chandra V. Gummalla, John O. Limb |
Wireless Collision Detect (WCD): Multiple Access with Receiver Initiated Feedback and Carrier Detect Signal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC (1) ![In: 2000 IEEE International Conference on Communications: Global Convergence Through Communications, ICC 2000, New Orleans, LA, USA, June 18-22, 2000, pp. 397-401, 2000, IEEE, 0-7803-6283-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Dima Stopel, Robert Moskovitch, Zvi Boger, Yuval Shahar, Yuval Elovici |
Using artificial neural networks to detect unknown computer worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Comput. Appl. ![In: Neural Comput. Appl. 18(7), pp. 663-674, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Feature selection, Artificial neural networks, Worm detection, HIDS |
17 | Yoshimasa Ohmoto, Takashi Miyake, Toyoaki Nishida |
A Method to Detect an Atmosphere of "Involvement, Enjoyment, and/or Excitement" in Multi-user Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVA ![In: Intelligent Virtual Agents, 9th International Conference, IVA 2009, Amsterdam, The Netherlands, September 14-16, 2009, Proceedings, pp. 537-538, 2009, Springer, 978-3-642-04379-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
physiological indices, affective interaction, multi-user interaction |
17 | Jungsuk Song, Hiroki Takakura, Yongjin Kwon |
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 55-61, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Hanli Wang, Sam Kwong |
Hybrid Model to Detect Zero Quantized DCT Coefficients in H.264. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(4), pp. 728-735, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Zsolt Kira |
Modeling cross-sensory and sensorimotor correlations to detect and localize faults in mobile robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2007 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 29 - November 2, 2007, Sheraton Hotel and Marina, San Diego, California, USA, pp. 1520-1526, 2007, IEEE, 978-1-4244-0912-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Elisa Bertino, Ashish Kamra, James P. Early |
Profiling Database Application to Detect SQL Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 449-458, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Hongxun Liu, José G. Delgado-Frias, Sirisha Medidi |
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 15th IEEE International Conference on Networks, ICON 2007, 19-21 November 2007, Adelaide, Australia, pp. 7-12, 2007, IEEE, 1-4244-1230-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Kalyana R. Kantipudi, Vishwani D. Agrawal |
A Reduced Complexity Algorithm for Minimizing N-Detect Tests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 20th International Conference on VLSI Design (VLSI Design 2007), Sixth International Conference on Embedded Systems (ICES 2007), 6-10 January 2007, Bangalore, India, pp. 492-497, 2007, IEEE Computer Society, 0-7695-2762-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Roger Les Cottrell, Connie Logg, Mahesh Chhapparia, Maxim Grigoriev, Felipe Haro, Fawad Nazir, Mark Sandford |
Evaluation of Techniques to Detect Significant Network Performance Problems using End-to-End Active Network Measurements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pp. 85-94, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Nobutaka Kawaguchi, Yusuke Azuma, Shintaro Ueda, Hiroshi Shigeno, Ken-ichi Okada |
ACTM: Anomaly Connection Tree Method to detect Silent Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 901-908, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | James D. Jones |
Using Logic Programming to Detect Deception on the Basis of Actions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 662-663, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Franck Le, Sihyung Lee, Tina Wong, Hyong S. Kim, Darrell Newcomb |
Minerals: using data mining to detect router misconfigurations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 2nd Annual ACM Workshop on Mining Network Data, MineNet 2006, Pisa, Italy, September 15, 2006, pp. 293-298, 2006, ACM, 1-59593-569-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network misconfiguration, static analysis, association rules mining, routers |
17 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (1) ![In: Fuzzy Systems and Knowledge Discovery, Second International Conference, FSKD 2005, Changsha, China, August 27-29, 2005, Proceedings, Part I, pp. 629-634, 2005, Springer, 3-540-28312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
17 | John G. Levine, Julian B. Grizzard, Henry L. Owen |
A Methodology to Detect and Characterize Kernel Level Rootkit Exploits Involving Redirection of the System Call Table. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, USA, pp. 107-128, 2004, IEEE Computer Society, 0-7695-2117-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Cem Ünsalan, Kim L. Boyer |
A System to Detect Houses and Residential Street Networks in Multispectral Satellite Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR (3) ![In: 17th International Conference on Pattern Recognition, ICPR 2004, Cambridge, UK, August 23-26, 2004., pp. 49-52, 2004, IEEE Computer Society, 0-7695-2128-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Danny Hesse, Jana Dittmann, Andreas Lang 0001 |
Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 30th EUROMICRO Conference 2004, 31 August - 3 September 2004, Rennes, France, pp. 453-456, 2004, IEEE Computer Society, 0-7695-2199-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Brady Benware, Chris Schuermyer, Sreenevasan Ranganathan, Robert Madge, Prabhu Krishnamurthy, Nagesh Tamarapalli, Kun-Han Tsai, Janusz Rajski |
Impact of Multiple-Detect Test Patterns on Product Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2003 International Test Conference (ITC 2003), Breaking Test Interface Bottlenecks, 28 September - 3 October 2003, Charlotte, NC, USA, pp. 1031-1040, 2003, IEEE Computer Society, 0-7803-8106-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Keith D. Cooper, Li Xu |
An efficient static analysis algorithm to detect redundant memory operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSP/ISMM ![In: Proceedings of The Workshop on Memory Systems Performance (MSP 2002), June 16, 2002 and The International Symposium on Memory Management (ISMM 2002), June 20-21, 2002, Berlin, Germany, pp. 97-107, 2002, ACM, 1-58113-539-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Ajay D. Kshemkalyani, Mukesh Singhal |
A One-Phase Algorithm to Detect Distributed Deadlocks in Replicated Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 11(6), pp. 880-895, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
generalized deadlock, Distributed database, replicated database, graph reduction, quorum consensus |
17 | Heidrun Engel |
Data flow transformations to detect results which are corrupted by hardware faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 1st High-Assurance Systems Engineering Workshop (HASE '96), October 22, 1996, Niagara, Canada, Proceedings, pp. 279-, 1996, IEEE Computer Society, 0-8186-7629-9. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
data flow transformations, corrupt result detection, hardware fault coverage, modified instruction, diverse data representation, modified instruction sequences, assembler level, high language level, fault tolerant computing, software faults, design diversity, hardware fault detection |
16 | Zouheir Trabelsi, Hamza Rahmani |
Detection of Sniffers in an Ethernet Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 170-182, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Irith Pomeranz, Sudhakar M. Reddy |
Test Compaction for Synchronous Sequential Circuits by Test Sequence Recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Great Lakes Symposium on VLSI ![In: 8th Great Lakes Symposium on VLSI (GLS-VLSI '98), 19-21 February 1998, Lafayette, LA, USA, pp. 216-221, 1998, IEEE Computer Society, 0-8186-8409-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
dynamic test compaction, synchronous sequential circuits, static test compaction |
16 | Luca Simoncini, Arthur D. Friedman |
Incomplete Fault Coverage In Modular Miltiprocessor Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference (1) ![In: Proceedings 1978 ACM Annual Conference, Washington, DC, USA, December 4-6, 1978, Volume I, pp. 210-216, 1978, ACM, 978-0-89791-000-2. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
|
14 | Sébastien Macé, Hervé Locteau, Ernest Valveny, Salvatore Tabbone |
A system to detect rooms in architectural floor plan images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Document Analysis Systems ![In: The Ninth IAPR International Workshop on Document Analysis Systems, DAS 2010, June 9-11, 2010, Boston, Massachusetts, USA, pp. 167-174, 2010, ACM, 978-1-60558-773-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Dominique Michelucci, Pascal Schreck, Simon E. B. Thierry, Christoph Fünfzig, Jean-David Génevaux |
Using the witness method to detect rigid subsystems of geometric constraints in CAD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Solid and Physical Modeling ![In: ACM Symposium on Solid and Physical Modeling, Proceedings of the 15th ACM Symposium on Solid and Physical Modeling, SPM 2010, Haifa, Israel, September 1-3, 2010, pp. 91-100, 2010, ACM, 978-1-60558-984-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
W-decomposition, rigidity theory, witness configuration, geometric constraints solving, Jacobian matrix |
14 | Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi |
A topological approach to detect conflicts in firewall policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-7, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali |
Honeybee-Based Model to Detect Intrusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 598-607, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
honeybee, intrusion detection, network security, natural computing |
14 | Javad Vazifehdan, Ramin Hekmat |
Performance Evaluation of multi-hop Detect-and-Forward and Amplify-and-Forward wireless transmission systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou |
Using likely program invariants to detect hardware errors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings, pp. 70-79, 2008, IEEE Computer Society, 978-1-4244-2397-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
An Algorithm to Detect Stepping-Stones in the Presence of Chaff Packets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 485-492, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Furong Wang, Yipeng Qu, Baoming Bai, Fan Zhang, Chen Huang 0003 |
Using Multiple Detectors to Detect the Backoff Time of the Selfish Node in Wireless Mesh Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 279-288, 2008, Springer, 978-3-540-69294-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple detectors, Wireless mesh network, MAC layer, selfish node |
14 | Irfan A. Siddavatam, Jayant Gadge |
Comprehensive test mechanism to detect attack on Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Tudor Gîrba, Stéphane Ducasse, Adrian Kuhn, Radu Marinescu 0001, Daniel Ratiu |
Using concept analysis to detect co-change patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWPSE ![In: 9th International Workshop on Principles of Software Evolution (IWPSE 2007), in conjunction with the 6th ESEC/FSE joint meeting, Dubrovnik, Croatia, September 3-4, 2007, pp. 83-89, 2007, ACM, 978-1-59593-722-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
co-change analysis, evolution analysis, concept analysis |
14 | Syed A. Khayam, Hayder Radha |
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, UK, 24-28 June 2007, pp. 1385-1390, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Nobutaka Kawaguchi, Hiroshi Shigeno, Ken-ichi Okada |
d-ACTM: Distributed Anomaly Connection Tree Method to detect Silent Worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 26th IEEE International Performance Computing and Communications Conference, IPCCC 2007, April 11-13, 2007, New Orleans, Louisiana, USA, pp. 510-517, 2007, IEEE Computer Society, 1-4244-1138-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jalel Rejeb, Mahalakshmi Srinivasan |
Extension of Aho-Corasick Algorithm to Detect Injection Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCSS (1) ![In: Advances in Computer and Information Sciences and Engineering, Proceedings of the 2007 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 2007), Bridgeport, CT, USA, December 3-12, 2007, pp. 207-212, 2007, Springer, 978-1-4020-8740-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Mingwu Zhang, Bo Yang 0003, Yu Qi, Wenzheng Zhang |
Using Trust Metric to Detect Malicious Behaviors in WSNs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 104-108, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Alireza Saberi, Mojtaba Vahidi, Behrouz Minaei-Bidgoli |
Learn to Detect Phishing Scams Using Learning and Ensemble ?Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 2-5 November 2007, Silicon Valley, CA, USA, pp. 311-314, 2007, IEEE Computer Society, 0-7695-3028-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jian-Yun Lai, Yan-Ting Chen, Te-Heng Wang, Hong-Si Chang, Jui-Lin Lai |
Biosensor Integrated with Transducer to Detect the Glucose. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 2015-2018, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Joaquín Salas, Hugo Jiménez-Hernández, José-Joel González-Barbosa, Juan-Bautista Hurtado-Ramos, Sandra Canchola |
A Double Layer Background Model to Detect Unusual Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIVS ![In: Advanced Concepts for Intelligent Vision Systems, 9th International Conference, ACIVS 2007, Delft, The Netherlands, August 28-31, 2007, Proceedings, pp. 406-416, 2007, Springer, 978-3-540-74606-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya |
PHONEY: Mimicking User Response to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 668-672, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Darong Huang, Xiyue Huang, Changcheng Xiang, Wei Li, Yin Zhang |
The Covariance Constraint Control Method of Fault Detect for Complicated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (2) ![In: Computational Intelligence, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part II, pp. 580-588, 2006, Springer, 3-540-37274-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yongzhong Zhang, Jianhua Yang, Chunming Ye |
Resistance Analysis to Intruders' Evasion of a Novel Algorithm to Detect Stepping-Stone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 477-486, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yang Feng, Senlin Luo, Limin Pan |
An Extensive Method to Detect the Image Digital Watermarking Based on the Known Template. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM ![In: Advances in Multimedia Information Processing - PCM 2006, 7th Pacific Rim Conference on Multimedia, Hangzhou, China, November 2-4, 2006, Proceedings, pp. 31-40, 2006, Springer, 3-540-48766-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
extensive detection, correlative detection, digital watermarking |
14 | Tomohiko Ohtsuka, Akiyoshi Kondo |
A new approach to detect core and delta of the fingerprint using extended relational graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 249-252, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Lei Qu, Ning Wang 0012, W. Lewis Johnson |
Using Learner Focus of Attention to Detect Learner Motivation Factors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Modeling ![In: User Modeling 2005, 10th International Conference, UM 2005, Edinburgh, Scotland, UK, July 24-29, 2005, Proceedings, pp. 70-73, 2005, Springer, 3-540-27885-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Cathal Seoighe, Konrad Scheffler |
Very Low Power to Detect Asymmetric Divergence of Duplicated Genes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comparative Genomics ![In: Comparative Genomics, RECOMB 2005 International Workshop, RCG 2005, Dublin, Ireland, September 18-20, 2005, Proceedings, pp. 142-152, 2005, Springer, 3-540-28932-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Santosh Biswas, P. Srikanth, R. Jha, Siddhartha Mukhopadhyay, Amit Patra, Dipankar Sarkar 0001 |
On-Line Testing of Digital Circuits for n-Detect and Bridging Fault Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 88-93, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Nicholas Lesica, Garrett B. Stanley |
An LGN Inspired Detect/Transmit Framework for High Fidelity Relay of Visual Information with Limited Bandwidth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BVAI ![In: Brain, Vision, and Artificial Intelligence, First International Symposium, BVAI 2005, Naples, Italy, October 19-21, 2005, Proceedings, pp. 177-186, 2005, Springer, 3-540-29282-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Akira Yamada 0001, Yutaka Miyake, Keisuke Takemori, Toshiaki Tanaka |
Intrusion Detection System to Detect Variant Attacks Using Learning Algorithms with Automatic Generation of Training Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 650-655, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Rachna Dhamija, J. D. Tygar |
Phish and HIPs: Human Interactive Proofs to Detect Phishing Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIP ![In: Human Interactive Proofs, Second International Workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005, Proceedings, pp. 127-141, 2005, Springer, 3-540-26001-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | David R. Martin 0001, Charless C. Fowlkes, Jitendra Malik |
Learning to Detect Natural Image Boundaries Using Local Brightness, Color, and Texture Cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 26(5), pp. 530-549, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cue combination, ground truth segmentation data set, boundary localization, Texture, supervised learning, boundary detection, natural images |
14 | Yi Li, Zhiyan Wang, Haizan Zeng |
Correlation Filter: An Accurate Approach to Detect and Locate Low Contrast Character Strings in Complex Table Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 26(12), pp. 1639-1644, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Shivani Agarwal 0001, Aatif Awan, Dan Roth |
Learning to Detect Objects in Images via a Sparse, Part-Based Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 26(11), pp. 1475-1490, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
machine learning, image representation, Object detection, evaluation/methodology |
14 | Xiangrong Wang, Jun Xu, Christopher H. Pham |
An Effective Method to Detect Software Memory Leakage Leveraged from Neuroscience Principles Governing Human Memory Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 15th International Symposium on Software Reliability Engineering (ISSRE 2004), 2-5 November 2004, Saint-Malo, Bretagne, France, pp. 329-339, 2004, IEEE Computer Society, 0-7695-2215-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Haizhi Xu, Wenliang Du, Steve J. Chapin |
Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 21-38, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Guangzhi Qu, Salim Hariri, Santosh Jangiti, Suhail Hussain, Seungchan Oh, Samer Fayssal, Mazin S. Yousif |
Abnormality Metrics to Detect and Protect against Network Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPS ![In: The IEEE/ACS International Conference on Pervasive Services (ICPS'04), July 19-23, 2004, American University of Beirut (AUB), Lebanon, pp. 105-111, 2004, IEEE Computer Society, 0-7803-8577-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jeffrey Ng, Anil A. Bharath |
Steering in Scale Space to Optimally Detect Image Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECCV (1) ![In: Computer Vision - ECCV 2004, 8th European Conference on Computer Vision, Prague, Czech Republic, May 11-14, 2004. Proceedings, Part I, pp. 482-494, 2004, Springer, 3-540-21984-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Arun Lakhotia, Eric Uday Kumar |
Abstracting Stack to Detect Obfuscated Calls in Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 15-16 September 2004, Chicago, IL, USA, pp. 17-26, 2004, IEEE Computer Society, 0-7695-2144-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Irith Pomeranz, Sudhakar M. Reddy, Sandip Kundu |
On the Characterization of Hard-to-Detect Bridging Faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2003 Design, Automation and Test in Europe Conference and Exposition (DATE 2003), 3-7 March 2003, Munich, Germany, pp. 11012-11019, 2003, IEEE Computer Society, 0-7695-1870-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 19861 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|