Sciweavers

932 search results - page 98 / 187
» Capturing, sharing, and using local place information
Sort
View
SCIA
2007
Springer
180views Image Analysis» more  SCIA 2007»
14 years 2 months ago
Automatic Segmentation of Overlapping Fish Using Shape Priors
We present results from a study where we segment fish in images captured within fish cages. The ultimate goal is to use this information to extract the weight distribution of the f...
Sigmund Clausen, Katharina Greiner, Odd Andersen, ...
HYBRID
2001
Springer
14 years 18 days ago
Diagnosis of Physical Systems with Hybrid Models Using Parametrized Causality
Efficient algorithms exist for fault detection and isolation of physical systems based on functional redundancy. In a qualitative approach, this redundancy can be captured by a tem...
Pieter J. Mosterman
IWFM
2003
13 years 9 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins
GCC
2005
Springer
14 years 1 months ago
Using Fuzzy Cognitive Map to Effectively Classify E-Documents and Application
In the current Web, e-document has been the most common vehicle for delivering and exchanging information. As the amount of e-documents has grown enormously, effective classificati...
Jianzeng Wang, Yunpeng Xing, Peng Shi, Fei Guo, Zh...
CN
2006
117views more  CN 2006»
13 years 8 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance