107 papers:
- DATE-2015-TaatizadehN #automation #design #detection #embedded #validation
- A methodology for automated design of embedded bit-flips detectors in post-silicon validation (PT, NN), pp. 73–78.
- KDD-2015-TsengYHKC #detection #framework #named
- FrauDetector: A Graph-Mining-based Framework for Fraudulent Phone Call Detection (VST, JCY, CWH, YK, KTC), pp. 2157–2166.
- CGO-2015-StepanovS #c++ #detection #memory management #named #performance
- MemorySanitizer: fast detector of uninitialized memory use in C++ (ES, KS), pp. 46–55.
- CASE-2014-CaoMDZ #detection #performance #visual notation
- A gabor based fast interest point detector for image-based robot visual servo control (ZC, FM, JSD, JZ), pp. 883–888.
- DATE-2014-ZussaDTDMGCT #detection #fault #injection #performance
- Efficiency of a glitch detector against electromagnetic fault injection (LZ, AD, KT, JMD, PM, LGS, JC, AT), pp. 1–6.
- ICSME-2014-Stephan #analysis #clone detection #detection #evaluation #mutation testing #using
- Model Clone Detector Evaluation Using Mutation Analysis (MS), pp. 633–638.
- CHI-2014-MinDWAZH #detection #named #quality #smarttech
- Toss-n-turn: smartphone as sleep and sleep quality detector (JKM, AD, JW, SA, JZ, JIH), pp. 477–486.
- ICPR-2014-ChenLLYH #adaptation #detection #forensics
- Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
- ICPR-2014-HtikeH #adaptation #detection #performance #video
- Efficient Non-iterative Domain Adaptation of Pedestrian Detectors to Video Scenes (KKH, DCH), pp. 654–659.
- ICPR-2014-SmedtBTG #combinator #detection #multi
- The Combinator: Optimal Combination of Multiple Pedestrian Detectors (FDS, KVB, TT, TG), pp. 3522–3527.
- ICPR-2014-WangLSSC #detection #evaluation
- Evaluation of Feature Detectors and Descriptors for Motion Detection from Aerial Videos (CW, SL, YS, YS, HC), pp. 2596–2601.
- ICPR-2014-ZhangM #adaptation #detection
- Improving Object Tracking by Adapting Detectors (LZ, LvdM), pp. 1218–1223.
- SAC-2014-MazelFF #comparison #detection #diagrams #network #visual notation
- Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
- FSE-2014-BaeCLR #api #detection #named #web
- SAFEWAPI: web API misuse detector for web applications (SB, HC, IL, SR), pp. 507–517.
- FSE-2014-SamakR #concurrent #detection #java #library #parallel #precise #thread
- Omen+: a precise dynamic deadlock detector for multithreaded Java libraries (MS, MKR), pp. 735–738.
- DATE-2013-El-NacouziAPZJM #detection #scalability
- A dual grain hit-miss detector for large die-stacked DRAM caches (MEN, IA, MP, JZ, NDEJ, AM), pp. 89–92.
- ICDAR-2013-HerasFVLS #architecture #detection
- Unsupervised Wall Detector in Architectural Floor Plans (LPdlH, DFM, EV, JL, GS), pp. 1245–1249.
- ICDAR-2013-LiuS #detection #documentation #equation #image
- A Simple Equation Region Detector for Printed Document Images in Tesseract (ZL, RS), pp. 245–249.
- ICDAR-2013-TeradaHFU #detection #on the
- On the Possibility of Structure Learning-Based Scene Character Detector (YT, RH, YF, SU), pp. 472–476.
- ECOOP-2013-FlanaganF #detection #named
- RedCard: Redundant Check Elimination for Dynamic Race Detectors (CF, SNF), pp. 255–280.
- SAC-2013-TeixeiraRG #detection #locality #parallel #using
- Indoor localization using SLAM in parallel with a natural marker detector (LT, ABR, MG), pp. 27–33.
- ICSE-2013-StephanASC #analysis #clone detection #comparison #detection #framework #mutation testing #using
- Using mutation analysis for a model-clone detector comparison framework (MS, MHA, AS, JRC), pp. 1261–1264.
- ASE-2012-NguyenVLG #detection #framework #knowledge-based #named #requirements
- REInDetector: a framework for knowledge-based requirements engineering (THN, BQV, ML, JG), pp. 386–389.
- SIGMOD-2012-ZellagK #consistency #detection #named #realtime
- ConsAD: a real-time consistency anomalies detector (KZ, BK), pp. 641–644.
- ICALP-v1-2012-LaplanteLR #bound #detection #quantum
- Classical and Quantum Partition Bound and Detector Inefficiency (SL, VL, JR), pp. 617–628.
- ICPR-2012-AhmedC #detection #robust
- A robust person detector for overhead views (IA, JNC), pp. 1483–1486.
- ICPR-2012-BarbulescuGGMR #2d #3d #detection #estimation #using
- 3D human pose estimation using 2D body part detectors (AB, WG, JG, TBM, FXR), pp. 2484–2487.
- ICPR-2012-ChoKKA #detection #kernel
- Bilateral kernel-based Region Detector (WC, SYK, AK, MAA), pp. 750–753.
- ICPR-2012-DuongDNLDLS #detection #eye tracking #locality #robust #video
- Robust eye localization in video by combining eye detector and eye tracker (CND, TCPD, TDN, DDL, DAD, BHL, SS), pp. 242–245.
- ICPR-2012-LankinenKK #categorisation #comparison #detection #visual notation
- A comparison of local feature detectors and descriptors for visual object categorization by intra-class repeatability and matching (JL, VK, JKK), pp. 780–783.
- ICPR-2012-LiSY #detection #invariant
- A Fully Affine Invariant Feature detector (WL, ZS, JY), pp. 2768–2771.
- ICPR-2012-MiksikM #detection #evaluation #performance
- Evaluation of local detectors and descriptors for fast feature matching (OM, KM), pp. 2681–2684.
- ICPR-2012-XiaDG #detection #invariant
- An accurate and contrast invariant junction detector (GSX, JD, YG), pp. 2780–2783.
- KDD-2012-WuWCT #detection #hybrid #named #recommendation
- HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation (ZW, JW, JC, DT), pp. 985–993.
- SAC-2012-AtifMO #detection #verification
- Formal verification of Unreliable Failure Detectors in Partially Synchronous Systems (MA, MRM, AO), pp. 478–485.
- ICSE-2012-LiE #detection #named
- CBCD: Cloned buggy code detector (JL, MDE), pp. 310–320.
- DATE-2011-HeidmannWP #architecture #detection #throughput
- Architecture and FPGA-implementation of a high throughput K+-Best detector (NH, TW, SP), pp. 240–245.
- DATE-2011-MadaniTCCD #detection #energy #standard
- An energy-efficient 64-QAM MIMO detector for emerging wireless standards (NMM, TT, JC, PC, WRD), pp. 246–251.
- DATE-2011-MotaS #detection #testing
- A true power detector for RF PA built-in calibration and testing (PFdM, JMdS), pp. 365–370.
- ICPC-2011-CordyR11a #clone detection #detection
- The NiCad Clone Detector (JRC, CKR), pp. 219–220.
- CIKM-2011-MirzaCCHH #detection #process
- Switch detector: an activity spotting system for desktop (HTM, LC, GC, IH, XH), pp. 2285–2288.
- SAC-2011-FontugneF #adaptation #detection
- A Hough-transform-based anomaly detector with an adaptive time interval (RF, KF), pp. 471–477.
- ICSE-2011-KimJKY #clone detection #detection #memory management #named
- MeCC: memory comparison-based clone detector (HK, YJ, SK, KY), pp. 301–310.
- ICST-2011-LuoDQ #concurrent #detection #manycore #performance
- Multicore SDK: A Practical and Efficient Deadlock Detector for Real-World Applications (ZDL, RD, YQ), pp. 309–318.
- ASE-2010-BiegelD #api #clone detection #detection #flexibility #implementation #named
- JCCD: a flexible and extensible API for implementing custom code clone detectors (BB, SD), pp. 167–168.
- DAC-2010-KaoCTC #detection #performance
- An efficient phase detector connection structure for the skew synchronization system (YCK, HMC, KTT, SCC), pp. 729–734.
- DATE-2010-CupaiuoloST #architecture #detection #ml #throughput
- Low-complexity high throughput VLSI architecture of soft-output ML MIMO detector (TC, MS, AT), pp. 1396–1401.
- DATE-2010-Moezzi-MadaniTD #detection #flexibility #standard
- A low-area flexible MIMO detector for WiFi/WiMAX standards (NMM, TT, WRD), pp. 1633–1636.
- PLDI-2010-LeeWHGM #debugging #detection #interface #named
- Jinn: synthesizing dynamic bug detectors for foreign language interfaces (BL, BW, MH, RG, KSM), pp. 36–49.
- ICPR-2010-HuangDLTL #authentication #detection #normalisation
- Finger-Vein Authentication Based on Wide Line Detector and Pattern Normalization (BH, YD, RL, DT, WL), pp. 1269–1272.
- ICPR-2010-LiuLLLS #detection #markov #modelling #process
- Noise-Robust Voice Activity Detector Based on Hidden Semi-Markov Models (XL, YL, YL, HL, BS), pp. 81–84.
- ICPR-2010-ZengM #detection #multi #people #robust
- Robust Head-Shoulder Detection by PCA-Based Multilevel HOG-LBP Detector for People Counting (CZ, HM), pp. 2069–2072.
- ICPR-2010-ZhangGC #detection #invariant #using
- Water Reflection Detection Using a Flip Invariant Shape Detector (HZ, XG, XC), pp. 633–636.
- ASE-2009-WegrzynowiczS #design pattern #detection #testing #towards
- Towards a Comprehensive Test Suite for Detectors of Design Patterns (PW, KS), pp. 103–110.
- DATE-2009-GarridoVSML #detection #implementation
- Implementation of a reduced-lattice MIMO detector for OFDM Systems (JSG, HV, MS, DM, AL), pp. 1626–1631.
- DATE-2009-LiFNBPC #architecture #co-evolution #design #detection #ml #parallel #set
- Algorithm-architecture co-design of soft-output ML MIMO detector for parallel application specific instruction set processors (ML, RF, DN, BB, LVdP, FC), pp. 1608–1613.
- DocEng-2009-Popat #detection
- A panlingual anomalous text detector (ACP), pp. 201–204.
- SEKE-2009-BrownBD #detection #named #open source
- FiGD: An Open Source Intellectual Property Violation Detector (CDB, DB, DD), pp. 536–541.
- DATE-2008-LiBXNPC #architecture #detection #optimisation #parallel #programmable
- Optimizing Near-ML MIMO Detector for SDR Baseband on Parallel Programmable Architectures (ML, BB, WX, DN, LVdP, FC), pp. 444–449.
- ICPR-2008-BellaviaTV #detection #parametricity
- A non-parametric scale-based corner detector (FB, DT, CV), pp. 1–4.
- ICPR-2008-ChenWWM #detection #generative
- GA based feature generation for training cascade object detector (QC, HW, TW, KM), pp. 1–4.
- ICPR-2008-HanifPN #detection #image
- A cascade detector for text detection in natural scene images (SMH, LP, PN), pp. 1–4.
- ICPR-2008-KadarBS #bound #detection #evolution #image #programming #search-based
- Evolving boundary detectors for natural images via Genetic Programming (IK, OBS, MS), pp. 1–4.
- ICPR-2008-KaiserH #analysis #detection
- Qualitative analysis of spatio-temporal event detectors (BK, GH), pp. 1–4.
- ICPR-2008-ThomeA #bottom-up #detection #invariant
- A bottom-up, view-point invariant human detector (NT, SA), pp. 1–4.
- FSE-2008-LeS #detection #named
- Marple: a demand-driven path-sensitive buffer overflow detector (WL, MLS), pp. 272–282.
- ISMM-2008-JungY #detection #memory management #summary
- Practical memory leak detector based on parameterized procedural summaries (YJ, KY), pp. 131–140.
- HCI-MIE-2007-KimKEKASK #adaptation #detection #realtime #using
- Real-Time Face Tracking System Using Adaptive Face Detector and Kalman Filter (JHK, BDK, JSE, CK, SHA, BJS, SKK), pp. 669–678.
- SAC-2007-NguyenT #detection #kernel #towards
- Towards a tamper-resistant kernel rootkit detector (AQN, YT), pp. 276–283.
- SAC-2007-SatzgerPTU #adaptation #detection #distributed
- A new adaptive accrual failure detector for dependable distributed systems (BS, AP, WT, TU), pp. 551–555.
- DATE-2006-AbbasIA #detection
- On-chip 8GHz non-periodic high-swing noise detector (MA, MI, KA), pp. 670–671.
- DATE-2006-ChaiK #detection #symmetry
- Building a better Boolean matcher and symmetry detector (DC, AK), pp. 1079–1084.
- DATE-2006-OmanaCRM #detection #fault #low cost #reliability
- Low-cost and highly reliable detector for transient and crosstalk faults affecting FPGA interconnects (MO, JMC, DR, CM), pp. 170–175.
- ICPR-v2-2006-ChenSYCG #detection
- Modification of the AdaBoost-based Detector for Partially Occluded Faces (JC, SS, SY, XC, WG), pp. 516–519.
- ICPR-v3-2006-VandeportaeleCM #detection #image #performance
- A Fast Detector of Line Images Acquired by an Uncalibrated Paracatadioptric Camera (BV, MC, PM), pp. 1042–1045.
- ICDAR-2005-LefevreV #detection #locality #multi #sequence #video
- Caption Localisation in Video Sequences by Fusion of Multiple Detectors (SL, NV), pp. 106–110.
- PLDI-2005-XuBH #detection #source code
- A serializability violation detector for shared-memory server programs (MX, RB, MDH), pp. 1–14.
- SEFM-2005-JhumkaH #detection
- Putting Detectors in Their Place (AJ, MH), pp. 33–43.
- ICML-2005-WuMR #classification #detection #linear #symmetry
- Linear Asymmetric Classifier for cascade detectors (JW, MDM, JMR), pp. 988–995.
- SEKE-2005-VoP #concurrent #detection #java
- A Deadlock Detector for Synchronous Java (DDV, CP), pp. 537–542.
- SAC-2005-YangC #algorithm #detection #maturity
- The T-detectors maturation algorithm based on match range model (DY, JC), pp. 43–44.
- ICPR-v1-2004-HallOC #detection #low level
- A Trainable Low-level Feature Detector (PMH, MO, JPC), pp. 708–711.
- ICPR-v2-2004-HeY #adaptation #detection
- Curvature Scale Space Corner Detector with Adaptive Threshold and Dynamic Region of Support (XCH, NHCY), pp. 791–794.
- ICPR-v2-2004-HuangAWL #detection #multi
- Boosting Nested Cascade Detector for Multi-View Face Detection (CH, HA, BW, SL), pp. 415–418.
- ICPR-v3-2004-ForestSCP #3d #approach #detection
- Laser Stripe Peak Detector for 3D Scanners. A FIR Filter Approach (JF, JS, EC, CP), pp. 646–649.
- ICPR-v3-2004-KolschT #analysis #detection #robust
- Analysis of Rotational Robustness of Hand Detection with a Viola-Jones Detector (MK, MT), pp. 107–110.
- KDD-2004-YoshidaAWMHNFY #detection
- Density-based spam detector (KY, FA, TW, HM, TH, AN, HF, KY), pp. 486–493.
- ASE-2003-HeuzerothML #design pattern #detection #generative #specification
- Generating Design Pattern Detectors from Pattern Specifications (DH, SM, WL), pp. 245–248.
- DATE-2003-VanasscheGS #analysis #detection #domain model #modelling
- Time-Varying, Frequency-Domain Modeling and Analysis of Phase-Locked Loops with Sampling Phase-Frequency Detectors (PV, GGEG, WMCS), pp. 10238–10243.
- ICDAR-2003-YuanT #detection #documentation #named
- Skewscope: The Textual Document Skew Detector (BY, CLT), pp. 49–53.
- PLDI-2003-HeineL #c #c++ #detection #memory management
- A practical flow-sensitive and context-sensitive C and C++ memory leak detector (DLH, MSL), pp. 168–181.
- ICPR-v2-2002-OlagueH #detection #flexibility #metric #modelling #multi #recognition
- Flexible Model-Based Multi-Corner Detector for Accurate Measurements and Recognition (GO, BH), pp. 578–583.
- ICPR-v4-2002-YeungC #detection #network
- Parzen-Window Network Intrusion Detectors (DYY, CC), pp. 385–388.
- ICPR-v2-2000-PingLK #detection #float #recognition
- A Floating Feature Detector for Handwritten Numeral Recognition (ZP, CL, ACK), pp. 2553–2556.
- ICPR-v3-2000-AchardBD #detection #multi
- A Sub-Pixel and Multispectral Corner Detector (CA, EB, JD), pp. 3971–3974.
- ICPR-v3-2000-BorghysPA #detection #image #multi
- A Multi-Variate Contour Detector for High-Resolution Polarimetric SAR Images (DB, CP, MA), pp. 3650–3655.
- ICPR-v3-2000-LiuH00a #detection #implementation
- Two Practical Issues in Canny’s Edge Detector Implementation (GL, RMH), pp. 3680–3682.
- ICPR-v3-2000-Ziou #detection
- Optimal Line Detector (DZ), pp. 3534–3537.
- ICPR-v4-2000-MamicB #automation #detection #using
- Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector (GJM, MB), pp. 4767–4770.
- SOSP-1997-SavageABNS #concurrent #detection #multi #named #source code #thread
- Eraser: A Dynamic Data Race Detector for Multi-Threaded Programs (SS, MB, GN, PS, TEA), pp. 27–37.
- ICPR-1996-WuCY #detection
- A fuzzy-theory-based face detector (HW, QC, MY), pp. 406–410.
- ISSTA-1996-JacksonD #design #detection
- Elements of Style: Analyzing a Software Design Feature with a Counterexample Detector (DJ, CD), pp. 239–249.
- ICDAR-1993-LeplumeyCL #detection #music #robust
- A robust detector for music staves (IL, JC, GL), pp. 902–905.
- HCI-SHI-1993-MoriiKT #animation #detection #evaluation #eye tracking #realtime #using
- Evaluation of a Gaze Using Real-Time CG Eye-Animation Combined with Eye Movement Detector (KM, FK, NT), pp. 1103–1108.
- TOOLS-USA-1993-RowleyC #constraints #database #detection #encapsulation #maintenance #named #object-oriented
- Detectors: Encapsulating Constraint Maintenance in Object-Oriented Databases (MR, WWC), pp. 439–452.
- ICSE-1991-Jackson #detection #named
- Aspect: An Economical Bug-Detector (DJ), pp. 13–22.
- ICALP-1986-Lai #communication #detection #distributed #termination
- A Termination Detector for Static and Dynamic Distributed Systems with Asynchronous Non-first-in-first-out Communication (Extended Abstract) (THL), pp. 196–205.