Sciweavers

218 search results - page 40 / 44
» A knowledge-based system for automated vectorization
Sort
View
SASN
2003
ACM
14 years 21 days ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
CVIU
2006
317views more  CVIU 2006»
13 years 7 months ago
A general method for human activity recognition in video
In this paper we develop a system for human behaviour recognition in video sequences. Human behaviour is modelled as a stochastic sequence of actions. Actions are described by a f...
Neil Robertson, Ian D. Reid
PRESENCE
2007
167views more  PRESENCE 2007»
13 years 7 months ago
TimbreFields: 3D Interactive Sound Models for Real-Time Audio
We describe a methodology for Virtual Reality designers to capture and resynthesize the variations in sound made by objects when we interact with them through contact such as touc...
Richard Corbett, Kees van den Doel, John E. Lloyd,...
FORTE
2011
12 years 11 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...
AINA
2010
IEEE
13 years 11 months ago
Detecting Suspicious Motion with Nonimaging Sensors
—Automated distributed sentry systems need only detect suspicious behavior. Microphones and infrared detectors may suffice, as well as being simpler and cheaper than cameras whil...
Neil C. Rowe, Ahren A. Reed, Jose J. Flores