Sciweavers

261 search results - page 17 / 53
» Category detection using hierarchical mean shift
Sort
View
ESANN
2000
13 years 8 months ago
Learning VOR-like stabilization reflexes in robots
We present a binocular robot that learns compensatory camera movements for image stabilization purposes. Most essential in achieving satisfactory image stabilization performance i...
Francesco Panerai, Giorgio Metta, Giulio Sandini
HICSS
2011
IEEE
190views Biometrics» more  HICSS 2011»
12 years 11 months ago
Validating Cyber Security Requirements: A Case Study
Vulnerabilities in a system may have widely varying impacts on system security. In practice, security should not be defined as the absence of vulnerabilities. In practice, securit...
Robert K. Abercrombie, Frederick T. Sheldon, Ali M...
METRICS
1999
IEEE
13 years 11 months ago
Measuring Clone Based Reengineering Opportunities
Code duplication, plausibly caused by copying source code and slightly modifying it, is often observed in large systems. Clone detection and documentation have been investigated b...
Magdalena Balazinska, Ettore Merlo, Michel Dagenai...
ISSA
2004
13 years 8 months ago
Categorizing Vulnerabilities Using Data Clustering Techniques
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
Yun (Lillian) Li
MVA
2011
336views Computer Vision» more  MVA 2011»
13 years 2 months ago
In-vehicle camera traffic sign detection and recognition
: In this paper we discuss theoretical foundations and a practical realization of a real-time traffic sign detection, tracking and recognition system operating on board of a vehicl...
Andrzej Ruta, Fatih Porikli, Shintaro Watanabe, Yo...