Discovering distinctive action parts for action recognition
ناشر:
سال
: 2014شناسه الکترونیک: 10.1109/IWCMC.2014.6906414
کلیدواژه(گان): Android (operating system),n electronic messaging,n invasive software,n smart phones,n Android-based smart phones,n SMS-based malware,n airport check-in system,n analytical analysis,n defense-in-depth strategy,n detection time,n execution cost,n intrusion ambushing system,n malicious SMS prevention,n operating system,n optimal performance,n security features,n security framework,n third line-of-defense strategy,n warfare kill zone,n Airpor
کالکشن
:
-
آمار بازدید
Discovering distinctive action parts for action recognition
Show full item record
contributor author | Chen, Feifei | |
contributor author | Sang, Nong | |
contributor author | Gao, Changxin | |
contributor author | Kuang, Xiaoqin | |
date accessioned | 2020-03-12T22:49:31Z | |
date available | 2020-03-12T22:49:31Z | |
date issued | 2014 | |
identifier other | 7025304.pdf | |
identifier uri | https://libsearch.um.ac.ir:443/fum/handle/fum/1095860 | |
format | general | |
language | English | |
publisher | IEEE | |
title | Discovering distinctive action parts for action recognition | |
type | Conference Paper | |
contenttype | Metadata Only | |
identifier padid | 8236211 | |
subject keywords | Android (operating system) | |
subject keywords | n electronic messaging | |
subject keywords | n invasive software | |
subject keywords | n smart phones | |
subject keywords | n Android-based smart phones | |
subject keywords | n SMS-based malware | |
subject keywords | n airport check-in system | |
subject keywords | n analytical analysis | |
subject keywords | n defense-in-depth strategy | |
subject keywords | n detection time | |
subject keywords | n execution cost | |
subject keywords | n intrusion ambushing system | |
subject keywords | n malicious SMS prevention | |
subject keywords | n operating system | |
subject keywords | n optimal performance | |
subject keywords | n security features | |
subject keywords | n security framework | |
subject keywords | n third line-of-defense strategy | |
subject keywords | n warfare kill zone | |
subject keywords | n Airpor | |
identifier doi | 10.1109/IWCMC.2014.6906414 | |
journal title | mage Processing (ICIP), 2014 IEEE International Conference on | |
filesize | 495067 | |
citations | 0 |