Image differencing is used for many applications involving change detection. Although it is usually followed by a thresholding operation to isolate regions of change there are few methods available in the literature specific to (and appropriate for)
Face detection has drawn much attention in recent decades since the seminal work by Viola and Jones. While many subsequences have improved the work with more pow- erful learning algorithms, the feature representation used for face detection still ca
The proliferation of networked devices, systems, and appli- cations that we depend on every day makes managing net- works more important than ever. The increasing security, availability, and performance demands of these applications suggest that the
This article presents Andromaly—a framework for detecting malware on Android mobile devices. The proposed framework realizes a Host-based Malware Detection System that continuously monitors various features and events obtained from the mobile device
main/ has the dataset splits as distributed. d-dump/ has question dumps from YodaQA. d-freebase/ has mappings from question to single Freebase key, as distributed with the original WebQuestions dataset. d-freebase-mids/ has Freebase mids for each co
RCNN与YOLO系列论文,1.Rich feature hierarchies for accurate object detection and semantic segmentation,2.Spatial Pyramid Pooling in Deep Convolutional Networks for Visual Recognition,3.Fast R-CNN,4.Faster R-CNN Towards Real-Time Object Detection with Regi
fidic施工合同条件 2010多边银行协调版 红皮书4.3 Contractor's Representative
4.4 Subcontractors
4.5 Assignment of Benefit of Subcontract
4.6 Co-operation
4.7 Setting out
4.8 Safety Procedures
4.9 Quality Assurance
4.10 Site Data
4.11 Sufficiency of the Accepted Contr