Detection

Results: 16932



#Item
31Computer vision / Artificial intelligence / Applications of computer vision / Surveillance / Image processing / Conference on Computer Vision and Pattern Recognition / Object detection / Pyramid / Longuet-Higgins Prize

Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition Tim Althoff, Hyun Oh Song, Trevor Darrell UC Berkeley EECS/ICSI Multimedia Event Detection

Add to Reading List

Source URL: www.timalthoff.com

Language: English - Date: 2012-11-20 09:31:09
32Machine learning / Artificial neural networks / Learning / Artificial intelligence / Applied mathematics / Unsupervised learning / Anomaly detection / Data mining / Data security / Anomaly / Autoencoder / Feature learning

SAIFE: Unsupervised Wireless Spectrum Anomaly Detection with Interpretable Features Sreeraj Rajendran∗ , Wannes Meert† , Vincent Lenders‡ and Sofie Pollin∗ arXiv:1807.08316v1 [eess.SP] 22 Jul 2018

Add to Reading List

Source URL: www.lenders.ch

Language: English - Date: 2018-08-01 09:56:01
33Software engineering / Computer programming / Programming language theory / Compiler optimizations / Control flow / Loop optimization / Heap / Optimizing compiler / Foreach loop

Static Detection of Loop-Invariant Data Structures Guoqing Xu1 , Dacong Yan2 , and Atanas Rountev2 1 2 University of California, Irvine, CA, USA

Add to Reading List

Source URL: dacongy.github.io

Language: English - Date: 2017-06-27 01:04:15
34

Augur: Internet-Wide Detection of Connectivity Disruptions Paul Pearce†∗ , Roya Ensafi§∗ , Frank Li† , Nick Feamster§ , Vern Paxson† † University of California, Berkeley § Princeton University

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2017-06-30 16:01:04
    35Computing / Software engineering / Computer programming / Data types / C++ / C / Primitive types / Software bugs / Pointer / Struct / Memory safety / C dynamic memory allocation

    Runtime Detection of Temporal Memory Errors? Kostyantyn Vorobyov, Nikolai Kosmatov, Julien Signoles, and Arvid Jakobsson CEA, LIST, Software Reliability and Security Laboratory, PC 174, 91191 Gif-sur-Yvette France {kosty

    Add to Reading List

    Source URL: julien.signoles.free.fr

    Language: English - Date: 2017-09-15 19:04:17
    36Applied mathematics / Mathematics / Artificial neural network / Computational neuroscience / Market research / Market segmentation / Mathematical psychology / Perturbation theory / Outline of machine learning / Adversary / Traffic sign / Analysis

    NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles Jiajun Lu∗, Hussein Sibai∗, Evan Fabry, David Forsyth University of Illinois at Urbana Champaign {jlu23, sibai2, efabry2, daf}@il

    Add to Reading List

    Source URL: negative.vision

    Language: English - Date: 2017-10-09 09:03:00
    37Health / Mobile computers / Health informatics / Technology / Humancomputer interaction / Telehealth / Fashion accessories / Wearable devices / MHealth / Health data / Wearable computer / Health care

    PRESS RELEASE Zürich, August 2018 Partnership between Thryve and healthbank intelligent mHealth solution for the detection of health risks Thryve is driving forward the individualisation of health care

    Add to Reading List

    Source URL: www.healthbank.coop

    Language: English - Date: 2018-08-20 05:08:41
    38Computer vision / Applications of computer vision / Gesture recognition / Surveillance / Feature detection / Bag-of-words model in computer vision / Conference on Computer Vision and Pattern Recognition / Object detection

    Detection Bank: An Object Detection Based Video Representation for Multimedia Event Recognition Tim Althoff UC Berkeley EECS/ICSI

    Add to Reading List

    Source URL: www.timalthoff.com

    Language: English - Date: 2012-11-20 09:30:54
    39Botnets / Computer network security / Multi-agent systems / Spamming / Computing / Cybercrime / Concurrent computing / Domain generation algorithm / Srizbi botnet / Hidden Markov model / Cutwail botnet

    1 Poster: Zero-day Botnet Domain Generation Algorithm (DGA) Detection using Hidden Markov Models (HMMs) Yu Fu, Lu Yu, Richard Brooks Senior Member, IEEE

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2017-05-05 00:02:48
    40Technology / Information and communications technology / Computing / Machine learning / Anomaly detection / Data mining / Data security / Mobile telecommunications / Smartphone / Mobile phone / Anomaly

    Anomaly detection based on real-time exploitation of billing systems

    Add to Reading List

    Source URL: mavroud.is

    Language: English - Date: 2018-10-23 09:34:50
    UPDATE