×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [detection detection]
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
51 views
O BJ C UT & Pose Cut CVPR 05 ECCV 06 Philip Torr M. Pawan Kumar, Pushmeet Kohli and Andrew Zisserman UNIVERSITY OF OXFORD
215 views
Atp3xsum
1.554 views
Trachoma
711 views
Evolutionary IED Prevention 09 2006 Updated W Comments Jan2010
108 views
PURPOSE To increase individual soldier understanding of the mine and unexploded ordnance (UXO) threat in the former Yugoslavia, and to develop counter
217 views
Ivan Laptev IRISA/INRIA, Rennes, France September 07, 2006 Boosted Histograms for Improved Object Detection
215 views
Inactivation of hTERT transcription by Tax Julien Daniel, Raphael Doineau, Astrild Vaudaine, Sebastian Schmidt, Sebastian Olényi Gabet et al., Oncogene
215 views
Keith Keeler Microsoft Corporation Partner Account Manager Online services
[email protected]
217 views
Research Introduction Dr. C. Henry Tseng Assistant Professor NTPU CSIE UC Davis CS PhD
219 views
Learning Classifiers for Computer Aided Diagnosis Using Local Correlations Glenn Fung, Computer-Aided Diagnosis and Therapy Siemens Medical Solutions,
219 views
Penetration Testing Security Analysis and Advanced Tools: Snort
220 views
Next >