Sciweavers

587 search results - page 105 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ICPR
2004
IEEE
14 years 10 months ago
Stealth Vision for Protecting Privacy
We propose an anonymous video capturing system, called "Stealth Vision", that protects the privacy of objects by fading out their appearance. In order to avoid difficult...
Itaru Kitahara, Kiyoshi Kogure, Norihiro Hagita
CVPR
2010
IEEE
14 years 5 months ago
Grouplet: a Structured Image Representation for Recognizing Human and Object Interactions
Psychologists have proposed that many human-object interaction activities form unique classes of scenes. Recognizing these scenes is important for many social functions. To enable...
Bangpeng Yao, Li Fei-Fei
HRI
2009
ACM
14 years 3 months ago
Situated messages for asynchronous human-robot interaction
An ongoing issue in human robot interaction (HRI) is how people and robots communicate with one another. While there is considerable work in real-time human-robot communication, f...
Nicolai Marquardt, James Everett Young, Ehud Sharl...
KBSE
2009
IEEE
14 years 3 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
ISPAN
2005
IEEE
14 years 2 months ago
Safety and QoS-Aware Management of Heterogeneous Sensor Networks
— Recently, we have proposed ANSWER: AutoNomouS Wireless sEnsor netwoRk as a service platform whose mission is to provide dependable information services to in-situ mobile users ...
Mohamed F. Younis, Waleed A. Youssef, Mohamed Elto...