Detection

Results: 16932



#Item
551

39 GLAD: Group Anomaly Detection in Social Media Analysis ROSE YU, University of Southern California XINRAN HE, University of Southern California YAN LIU, University of Southern California

Add to Reading List

Source URL: roseyu.com

- Date: 2016-12-14 16:38:01
    552

    Type 2 Clone Detection On ASCET Models Francesco Gerardi Jochen Quante Reutlingen University

    Add to Reading List

    Source URL: pi.informatik.uni-siegen.de

    - Date: 2012-03-15 10:20:54
      553

      Machine learning for high-speed corner detection 後藤 雄飛 2011 年 10 月 11 日 1

      Add to Reading List

      Source URL: www.vision.cs.chubu.ac.jp

      - Date: 2011-12-13 06:38:21
        554

        Faster R-CNN: Towards Real-Time Object Detection with Region Proposal Networks Shaoqing Ren∗ Kaiming He Ross Girshick

        Add to Reading List

        Source URL: papers.nips.cc

        - Date: 2016-02-16 15:47:49
          555

          Fine-tuning Deep Architectures for Surgical Tool Detection Aneeq Zia?? , Daniel Castro?? , and Irfan Essa Georgia Institute of Technology, Atlanta, GA, USA http://www.cc.gatech.edu/cpl/projects/deepm2cai

          Add to Reading List

          Source URL: www.cc.gatech.edu

          - Date: 2016-10-24 18:10:01
            556

            In Papers from the AAAI Fall Symposium - Capturing and Using Patterns for Evidence Detection. October 13–15, 2006, Washington D.C., USA. A Position Paper: Value of Information for Evidence Detection Tina Eliassi-Rad

            Add to Reading List

            Source URL: www.eliassi.org

            - Date: 2011-06-16 16:28:39
              557

              Challenges in Automating Maze Detection Eric Morley CSLU OHSU Portland, OR 97239

              Add to Reading List

              Source URL: acl2014.org

              - Date: 2014-06-11 13:08:56
                558

                Lightweight Data Race Detection for Production Runs Ohio State CSE Technical Report #OSU-CISRC-1/15-TR01; last updated August 2016 Swarnendu Biswas Man Cao

                Add to Reading List

                Source URL: web.cse.ohio-state.edu

                - Date: 2016-08-07 11:18:27
                  559

                  CONTENT 1. Introduction 2. No detection of vulnerable persons, no support, no protection 3. No access to information: “What is their plan for us?” 4. Substandard conditions in most emergency reception sites in Athen

                  Add to Reading List

                  Source URL: exilesdanslesbalkans.files.wordpress.com

                  - Date: 2016-07-15 06:20:22
                    560

                    Towards a Formalisation of Erlang Failure and Failure Detection Audrianne Farrugia Adrian Francalanza

                    Add to Reading List

                    Source URL: staff.um.edu.mt

                    - Date: 2012-05-18 00:02:17
                      UPDATE