Cook and download a directory from the Software Heritage Vault
You have requested the cooking of the directory with identifier swh:1:dir:0a120453eb1c25c3d536eaaf91e6df9561c771da into a standard tar.gz archive
.
Are you sure you want to continue ?
Download a directory from the Software Heritage Vault
You have requested the download of the directory with identifier swh:1:dir:0a120453eb1c25c3d536eaaf91e6df9561c771da as a standard tar.gz archive
.
Are you sure you want to continue ?
Cook and download a revision from the Software Heritage Vault
You have requested the cooking of the history heading to revision with identifier swh:1:rev:e323470508611eaf338b719dfbf1a493251caf5c into a bare git archive
.
Are you sure you want to continue ?
Download a revision from the Software Heritage Vault
You have requested the download of the history heading to revision with identifier swh:1:rev:e323470508611eaf338b719dfbf1a493251caf5c as a bare git archive
.
Are you sure you want to continue ?
Invalid Email !
The provided email is not well-formed.
Download link has expired
The requested archive is no longer available for download from the Software Heritage Vault.
Do you want to cook it again ?
{ "extrinsic": { "provider": "https://deposit.softwareheritage.org/1/private/1357/meta/", "raw": { "origin": { "type": "deposit", "url": "https://doi.org/10.5201/ipol.2019.263" }, "origin_metadata": { "metadata": { "atom:external_identifier": "ipol.2019.263", "atom:title": "ipol_263", "codemeta:applicationCategory": "Image Processing", "codemeta:author": [ { "codemeta:affiliation": "CMLA, ENS Cachan, CNRS, Universit\u00e9 Paris-Saclay, Cachan, France", "codemeta:name": "Thibaud Ehret" }, { "codemeta:affiliation": "CMLA, ENS Cachan, CNRS, Universit\u00e9 Paris-Saclay, Cachan, France", "codemeta:name": "Axel Davy" }, { "codemeta:affiliation": "IIE, Facultad de Ingenier\u00eda, Universidad de la Rep\u00fablica, Montevideo, Uruguay", "codemeta:name": "Mauricio Delbracio" }, { "codemeta:affiliation": "CMLA, ENS Cachan, CNRS, Universit\u00e9 Paris-Saclay, Cachan, France", "codemeta:name": "Jean-Michel Morel" } ], "codemeta:dateCreated": "2018-11-28", "codemeta:datePublished": "2019-12-08", "codemeta:description": "How to Reduce Anomaly Detection in Images to Anomaly Detection in Noise", "codemeta:downloadUrl": "http://www.ipol.im/pub/art/2019/263/anomaly_detection_1.tar.gz", "codemeta:identifier": "https://doi.org/10.5201/ipol.2019.263", "codemeta:isPartOf": { "codemeta:identifier": "ISSN: 2105-1232 DOI: 10.5201/ipol", "codemeta:name": "Image Processing On Line (IPOL)", "codemeta:type": "Journal" }, "codemeta:keywords": [ "anomaly detection", "PHase Only Transform (PHOT)", "a contrario method" ], "codemeta:license": { "codemeta:name": "GPL-3.0-or-later", "codemeta:url": "https://spdx.org/licenses/GPL-3.0-or-later.html" }, "codemeta:operatingSystem": [ "Linux", "MacOS" ], "codemeta:programmingLanguage": "C", "codemeta:referencePublication": { "codemeta:abstract": "Anomaly detectors address the difficult problem of detecting automatically exceptions in a background image, that can be as diverse as a fabric or a mammography. Detection methods have been proposed by the thousands because each problem requires a different background model. By analyzing the existing approaches, we show that the problem can be reduced to detecting anomalies in residual images (extracted from the target image) in which noise and anomalies prevail. Hence, the general and impossible background modeling problem is replaced by a simple noise model, and allows the calculation of rigorous detection thresholds. Our approach is therefore unsupervised and works on arbitrary images. The residual images can favorably be computed on dense features of neural networks. Our detector is powered by the a contrario detection theory, which avoids over-detection by fixing detection thresholds taking into account the multiple tests.", "codemeta:identifier": "https://doi.org/10.5201/ipol.2019.263", "codemeta:name": "How to Reduce Anomaly Detection in Images to Anomaly Detection in Noise", "codemeta:url": "http://www.ipol.im/pub/art/2019/263/article.pdf" }, "codemeta:relatedLink": "http://ipolcore.ipol.im/demo/clientApp/demo.html?id=263", "codemeta:releaseNotes": "This code implements the algorithm(s) published in the IPOL paper \"How to Reduce Anomaly Detection in Images to Anomaly Detection in Noise\"", "codemeta:url": "http://www.ipol.im/pub/art/2019/263/", "codemeta:version": "1.0" }, "provider": { "metadata": {}, "provider_name": "", "provider_type": "deposit_client", "provider_url": "https://doi.org/10.5201/" }, "tool": { "configuration": { "sword_version": "2" }, "name": "swh-deposit", "version": "0.8.0" } } }, "when": "2020-12-27T17:47:33.392880+00:00" }, "original_artifact": [ { "checksums": { "sha1": "b8f852967d5472fc5ab07d51a403f0a9ecab6a86", "sha256": "b3c9778b9a805d4c067879ca8d5bcf2cb3cbad0dd46830ef5f15c2e8cb6df0ed" }, "filename": "archive.zip", "length": 74769933, "url": "https://deposit.softwareheritage.org/1/private/1357/raw/" } ] }
To reference or cite the objects present in the Software Heritage archive, permalinks based on SoftWare Hash IDentifiers (SWHIDs) must be used.
Select below a type of object currently browsed in order to display its associated SWHID and permalink.
File | Mode | Size |
---|---|---|
anomaly_detection_1 |
Computing file changes ...