Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Detection-Code'
Detection-Code published presentations and documents on DocSlides.
Face detection
by myesha-ticknor
State-of-the-art face detection demo. (Courtesy ....
Traffic Signal Detection
by danika-pritchard
Mahmoud. . Abdallah. Daniel . Eiland. The detect...
Anomaly Detection
by marina-yarberry
-. Traffic Video Surveillance. Ziming. Zhang, . ...
Anomaly Detection
by olivia-moreira
Introduction and Use Cases. Derick . Winkworth. ,...
Edge Detection Enhancement Using Gibbs Sampler
by briana-ranney
Author: Michael Sedivy. Introduction. Edge Detect...
Strategies for the detection
by luanne-stotts
of n=3 . and Rydberg . Positronium. levels in th...
Radio Tomographic Imaging for Fall Detection
by kittie-lecroy
Cameron . Fleming, Daniel Lazar, Christine Weston...
Detection of H
by karlyn-bohler
α. Absorption in . Exoplanetary. Exospheres. S...
Neighborhood Formation and Anomaly Detection in Bipartite G
by trish-goza
Jimeng. Sun, . Huiming. . Qu. , . Deepayan. . ...
Intrusion Detection Research
by sherrill-nordquist
Stephen Huang. Sept. 20, 2013. News. 2. http://ar...
Trends in Circumventing Web-Malware Detection
by giovanna-bartolotta
UTSA. Moheeb Abu Rajab, Lucas Ballard, Nav Jagpal...
More sliding window detection:
by danika-pritchard
Discriminative part-based models. Many slides bas...
The deterrent effects of drug detection dogs on
by tatiana-dople
Caitlin Hughes,. ¹ . Don Weatherburn. ². , Robe...
Face detection
by faustina-dinatale
State-of-the-art face detection demo. (Courtesy ....
Vision-Based Finger Detection
by sherrill-nordquist
and Its Applications. . 基於電腦視覺之手...
Home Intrusion Detection System
by natalia-silvester
Main Advantages. H . 2. 1. Fiber Optics Technolog...
Detection and Identification of Microorganisms
by lindy-dunigan
Chapter 12. Target Microorganisms for Molecular-B...
Rich feature Hierarchies for Accurate object detection and
by yoshiko-marsland
Ross . Girshick. , Jeff Donahue, Trevor Darrell,...
Rare Category Detection in Machine Learning
by mitsue-stanley
Prafulla Dawadi. Topics in Machine Learning. Outl...
Intrusion Detection
by min-jolicoeur
Intruders. Classes (from [ANDE80]:. two most publ...
Building Survivable Systems based on Intrusion Detection an
by sherrill-nordquist
Paper by: T. Bowen. Presented by: Tiyseer Al Homa...
Lane and Vehicle Detection
by sherrill-nordquist
A Synergistic . Approach. Wenxin. . Peng. Struct...
Event Detection Using an Attention-Based Tracker
by alida-meadow
Workshop on Performance Evaluation of Tracking Sy...
Masquerade Detection
by min-jolicoeur
Mark Stamp. 1. Masquerade Detection. Masquerade D...
A Probabilistic Misbehavior Detection Scheme
by tawny-fly
towards Efficient Trust Establishment in. Delay-t...
An Unbiased Distance-based Outlier Detection Approach for H
by test
DASFAA 2011. By. Hoang Vu Nguyen, . Vivekanand. ...
A simple method for multi-relational outlier detection
by trish-goza
Sarah Riahi and Oliver Schulte. School . of Compu...
Detection of anthropogenic formaldehyde over North America
by calandra-battersby
by oversampling of OMI data: Implications for TEM...
Multiple quadrilateral detection for projector-camera syste
by alexa-scheidler
applications. The 10th IEEE Conference on Industr...
Anomaly Detection Systems
by conchita-marotz
2. /86. Contents. Statistical . methods. parametr...
Health Monitoring and Fault Detection
by myesha-ticknor
of Claw-pole Generators. Siwei Cheng. CEME Semina...
Perception for Robot Detection
by calandra-battersby
2011/12/08. Robot Detection. Robot Detection. Bet...
Privacy-Preserving and Truthful Detection of Packet Droppin
by conchita-marotz
Abstract. Link error and malicious packet droppin...
On the Node Clone Detection
by kittie-lecroy
inWireless. Sensor Networks. Abstract. Wireless s...
Anomalous Payload Based Worm Detection
by yoshiko-marsland
Ke Wang, Gabriela Cretu, Salvatore Stolfo. Comput...
On Detection and Concealment of Critical Roles in Tactical
by giovanna-bartolotta
Zhuo. Lu. University of Memphis. Cliff Wang. Arm...
Anomaly detection
by myesha-ticknor
Problem motivation. Machine Learning. Anomaly det...
CS548 Spring 2015 Anomaly Detection Showcase
by danika-pritchard
Anomaly-based . Network Intrusion . Detection (A-...
Water Leak Detection for Commercial Buildings Prevent Costly Damage with Early Leak Detection
by nowisensorsllc
Make use of Nowisensors.com cutting-edge leak dete...
Detection of Deception
by kason790
Use of drugs that try to inhibit the inhibitor. Hy...
Load More...