Sciweavers

550 search results - page 70 / 110
» Complementarity of Error Detection Techniques
Sort
View
DISCEX
2003
IEEE
14 years 2 months ago
Willow System Demonstration
Dealing with damage that arises during operation of networked information systems is essential if such systems are to provide the dependability required by modern critical applica...
John C. Knight, Jonathan Hill, Philip E. Varner, P...
CVPR
2008
IEEE
14 years 11 months ago
Real-time pose estimation of articulated objects using low-level motion
We present a method that is capable of tracking and estimating pose of articulated objects in real-time. This is achieved by using a bottom-up approach to detect instances of the ...
Ben Daubney, David P. Gibson, Neill W. Campbell
ICPR
2004
IEEE
14 years 10 months ago
Eye Tracking Using Markov Models
We propose an eye detection and tracking method based on color and geometrical features of the human face using a monocular camera. In this method a decision is made on whether th...
A. M. Bagci, Ashfaq A. Khokhar, E. Cetin, Rashid A...
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
IBPRIA
2003
Springer
14 years 2 months ago
Robust Extraction of Vertices in Range Images by Constraining the Hough Transform
We describe a technique for extracting vertices from range images of cluttered box-like objects. Edge detection is performed and an edge map is acquired. Extraction of vertices is ...
Dimitrios Katsoulas