Sciweavers

18716 search results - page 3629 / 3744
» Automatic
Sort
View
CI
2007
99views more  CI 2007»
13 years 9 months ago
A Training Simulation System with Realistic Autonomous Ship Control
In this paper we present a computational approach to developing effective training systems for virtual simulation environments. In particular, we focus on a Naval simulation syste...
Monica N. Nicolescu, Ryan E. Leigh, Adam Olendersk...
CN
2007
224views more  CN 2007»
13 years 9 months ago
Automated adaptive intrusion containment in systems of interacting services
Large scale distributed systems typically have interactions among different services that create an avenue for propagation of a failure from one service to another. The failures ...
Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagc...
IJCV
2006
171views more  IJCV 2006»
13 years 9 months ago
Combining Generative and Discriminative Models in a Framework for Articulated Pose Estimation
We develop a method for the estimation of articulated pose, such as that of the human body or the human hand, from a single (monocular) image. Pose estimation is formulated as a s...
Rómer Rosales, Stan Sclaroff
IJCV
2006
159views more  IJCV 2006»
13 years 9 months ago
Wide Baseline Matching between Unsynchronized Video Sequences
3D reconstruction of a dynamic scene from features in two cameras usually requires synchronization and correspondences between the cameras. These may be hard to achieve due to occl...
Lior Wolf, Assaf Zomet
ISF
2008
114views more  ISF 2008»
13 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 3629 / 3744 Last » Next »