Sciweavers

598 search results - page 89 / 120
» Conditional Sensor Deployment Using Evolutionary Algorithms
Sort
View
IJRR
2010
159views more  IJRR 2010»
13 years 2 months ago
Vision-guided Robot System for Picking Objects by Casting Shadows
We present a complete vision guided robot system for model based 3D pose estimation and picking of singulated 3D objects. Our system employs a novel vision sensor consisting of a ...
Amit Agrawal, Yu Sun, John Barnwell, Ramesh Raskar
TMC
2008
159views more  TMC 2008»
13 years 6 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
ISMIS
2005
Springer
14 years 1 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
CISS
2008
IEEE
14 years 2 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
ICPR
2006
IEEE
14 years 8 months ago
Fingerprint Image Enhancement Based on Skin Profile Approximation
The performance of the fingerprint identification and verification systems relies heavily on the quality of the input fingerprint images. In this paper, we propose an effective im...
Venu Govindaraju, Zhixin Shi