[图书][B] Computer and machine vision: theory, algorithms, practicalities

ER Davies - 2012 - books.google.com
Computer and Machine Vision: Theory, Algorithms, Practicalities (previously entitled
Machine Vision) clearly and systematically presents the basic methodology of computer and …

[图书][B] Handbook of multisensor data fusion: theory and practice

M Liggins II, D Hall, J Llinas - 2017 - books.google.com
In the years since the bestselling first edition, fusion research and applications have adapted
to service-oriented architectures and pushed the boundaries of situational modeling in …

Opcode graph similarity and metamorphic detection

N Runwal, RM Low, M Stamp - Journal in computer virology, 2012 - Springer
In this paper, we consider a method for computing the similarity of executable files, based on
opcode graphs. We apply this technique to the challenging problem of metamorphic …

A binary linear programming formulation of the graph edit distance

D Justice, A Hero - IEEE Transactions on Pattern Analysis and …, 2006 - ieeexplore.ieee.org
A binary linear programming formulation of the graph edit distance for unweighted,
undirected graphs with vertex attributes is derived and applied to a graph recognition …

Annotated rdf

O Udrea, DR Recupero… - ACM Transactions on …, 2010 - dl.acm.org
Real-world use of RDF requires the ability to transparently represent and explain metadata
associated with RDF triples. For example, when RDF triples are extracted automatically by …

Contrastive graph similarity networks

L Wang, Y Zheng, D Jin, F Li, Y Qiao… - ACM Transactions on the …, 2024 - dl.acm.org
Graph similarity learning is a significant and fundamental issue in the theory and analysis of
graphs, which has been applied in a variety of fields, including object tracking …

Foundations of situation and threat assessment

AN Steinberg - Handbook of multisensor data fusion, 2017 - api.taylorfrancis.com
Assessment.................................................................................. 473 18.5. 2 Data Alignment in
Situation and Threat Assessment.......................... 47418.5. 2.1 Semantic Registration …

Probabilistic rdf

O Udrea, VS Subrahmanian… - 2006 IEEE International …, 2006 - ieeexplore.ieee.org
RDF is rapidly being adopted around the world as a paradigm for knowledge representation.
However, we are not aware of any version of RDF that can express probabilistic knowledge …

Efficient, interactive recommendation of mashup composition knowledge

S Roy Chowdhury, F Daniel, F Casati - Service-Oriented Computing: 9th …, 2011 - Springer
In this paper, we approach the problem of interactively querying and recommending
composition knowledge in the form of re-usable composition patterns. The goal is that of …

A direct approach to graph clustering.

A Hlaoui, S Wang - Neural Networks and Computational Intelligence, 2004 - actapress.com
A DIRECT APPROACH TO GRAPH CLUSTERING Adel Hlaoui and Shengrui Wang DMI,
University of Sherbrooke, Sherbrooke, QC, Canada J1K 2R1 {hlaoui, wang}@dmi.usherb.ca …