Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Detection-Spread'
Detection-Spread published presentations and documents on DocSlides.
Ashish Sharma PGY4 GI fellow
by littleccas
Grand Rounds . 2/19/15. Mentor- Milena Gould, M...
Local features: detection and description
by eatfuzzy
Devi Parikh. Slide credit: Kristen . Grauman. 1. D...
Detector/Receiver “Cold” Measurements
by evadeshell
MadMax. -Workshop. MPP Munich. O. . . Reimann for ...
Efficient Algorithms for SNP Genotype Data Analysis using Hidden
by festivehippo
Markov Models of Haplotype Diversity. Justin Kenne...
RiskRanker : Scalable and Accurate Zero-day Android Malware Detection
by relylancome
Grace. M, Zhou. Y, . Shilong. . Z, Jiang. . X. Ris...
Repeats and composition bias
by contessi
Miguel . Andrade. Faculty of Biology, . Johannes G...
Additional tasks related to activity recogntion
by sterialo
Mitja Luštrek. Jožef Stefan Institute. Departmen...
AdaScale: Towards Real-time Video Object Detection using Adaptive Scaling
by alida-meadow
AdaScale: Towards Real-time Video Object Detectio...
802.11ax Preamble Design and Auto-detection-r4
by conchita-marotz
802.11ax Preamble Design and Auto-detection-r4 Se...
Understanding and Detecting Real-World Performance Bugs
by tatyana-admore
Understanding and Detecting Real-World Performanc...
A New Detection of Extragalactic AME
by natalia-silvester
A New Detection of Extragalactic AME Eric J. Murp...
Patch Occupancy and Patch Dynamics
by calandra-battersby
Patch Occupancy and Patch Dynamics Single specie...
Network Monitoring Stolen from:
by test
Network Monitoring Stolen from: Daniel Schatz @vi...
Autonomous Driving in
by lindy-dunigan
Autonomous Driving in Urban Environments : Boss...
Towards a Masquerade Detection System Based on User’s Tasks
by alida-meadow
Towards a Masquerade Detection System Based on Us...
Site Visits and USCIS Fraud Detection Sonali Patnaik Patnaik
by tatiana-dople
Site Visits and USCIS Fraud Detection Sonali Pat...
HOGgles Visualizing Object Detection Features C. Vondrick
by aaron
HOGgles Visualizing Object Detection Features C....
Firewalls and Intrusion Detection Systems David Brumley dbrumley@cmu.edu
by trish-goza
Firewalls and Intrusion Detection Systems David B...
Object Recognition and Feature Detection Using MATLAB
by min-jolicoeur
Sadhana Venkataraman. 1. , Yukai Tomsovic. 2. , ...
Autonomous Driving in Urban Environments
by faustina-dinatale
: . Boss . and . the Urban Challenge. Journal of ...
SYNOPSYS
by lois-ondreau
Digital Addressable Water Leak Detection System. ...
Software-Based Online Detection
by cheryl-pisano
of Hardware . Defects:. Mechanisms, Architectura....
Object Recognition and Feature Detection Using MATLAB
by luanne-stotts
Sadhana Venkataraman. 1. , Yukai Tomsovic. 2. , ...
04/19/2017 SB 1371 compliance plan
by tatyana-admore
1. Preview. Common Goals. Program Summary. SoCalG...
Northrop Grumman Cybersecurity
by cheryl-pisano
Research Consortium (NGCRC). 08 November 2018. Bh...
Software-Based Online Detection
by lois-ondreau
of Hardware . Defects:. Mechanisms, Architectura....
April 2011 Environmental Monitoring, Safety & Emergency
by calandra-battersby
Detection of Fires. Electrical Equipment behind p...
L esson 5 Basics of Incident Detection
by calandra-battersby
UTSA IS 6353 Security Incident Response. Overview...
Mitigating IoT-based Cyberattacks on the Smart Grid
by alida-meadow
Yasin. Yilmaz, . Mahsa. Mozaffari. Secure and I...
Anomaly Detection Lecture Notes for Chapter
by pasty-toler
9. Introduction to Data Mining, . 2. nd. Edition...
Wavelet Based Real-time Smoke Detection In Video
by natalia-silvester
This paper was published in the journal . Signal ...
Distributed Denial of Service
by olivia-moreira
(. DDoS. ). Defending against Flooding-Based . DD...
Friday, February 9, 2018
by luanne-stotts
Episode 494. 12:00 PM EST. . Sal La . Duca. Env...
Fire-Extinguishing Autonomous Robot
by calandra-battersby
Smokey the . Bot. Creator: Matthew Bellman. Intel...
Object detection, deep learning, and R-CNNs
by pasty-toler
Ross Girshick. Microsoft Research. Guest lecture ...
Intrusion Detection &
by jane-oiler
Snort. Dan Fleck, PhD. dfleck@gmu.edu. Intrusion ...
Tripod Turnstile Swing
by trish-goza
Gate. Swing. . Speedgate. Slide . Speedgate. Ful...
Detection of Misinformation
by ellena-manuel
on Online Social Networking. Group Members. :. S...
Computer Security: Principles and Practice
by marina-yarberry
Fourth Edition. By: William Stallings and Lawrie...
Preventing Runovers and Backovers
by min-jolicoeur
Technology Solutions. Are there technological sol...
Load More...