Sciweavers

715 search results - page 93 / 143
» Automatic Programming for Sequence Control
Sort
View
DSN
2006
IEEE
15 years 8 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
IROS
2009
IEEE
147views Robotics» more  IROS 2009»
15 years 9 months ago
A multi-hypothesis topological SLAM approach for loop closing on edge-ordered graphs
— We present a method for topological SLAM that specifically targets loop closing for edge-ordered graphs. Instead of using a heuristic approach to accept or reject loop closing...
Stephen Tully, George Kantor, Howie Choset, Felix ...
126
Voted
ICIP
2010
IEEE
15 years 9 days ago
Stereoscopic content production of complex dynamic scenes using a wide-baseline monoscopic camera set-up
Conventional stereoscopic video content production requires use of dedicated stereo camera rigs which is both costly and lacking video editing flexibility. In this paper, we propo...
Jean-Yves Guillemaut, Muhammad Sarim, Adrian Hilto...
PPDP
2010
Springer
15 years 6 days ago
Rewrite-based verification of XML updates
We propose a model for XML update primitives of the W3C XQuery Update Facility as parameterized rewriting rules of the form: "insert an unranked tree from a regular tree lang...
Florent Jacquemard, Michaël Rusinowitch
ICVS
1999
Springer
15 years 6 months ago
ADORE: Adaptive Object Recognition
Many modern computer vision systems are built by chaining together standard vision procedures, often in graphical programming environments such as Khoros, CVIPtools or IUE. Typical...
Bruce A. Draper, José Bins, Kyungim Baek