Sciweavers

236 search results - page 39 / 48
» Control variate technique: A constructive approach
Sort
View
RAID
2007
Springer
14 years 1 months ago
Understanding Precision in Host Based Intrusion Detection
Abstract. Many host-based anomaly detection systems monitor process execution at the granularity of system calls. Other recently proposed schemes instead verify the destinations of...
Monirul I. Sharif, Kapil Singh, Jonathon T. Giffin...
MASCOTS
2007
13 years 9 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
PAMI
2012
11 years 10 months ago
Fast Joint Estimation of Silhouettes and Dense 3D Geometry from Multiple Images
—We propose a probabilistic formulation of joint silhouette extraction and 3D reconstruction given a series of calibrated 2D images. Instead of segmenting each image separately i...
Kalin Kolev, Thomas Brox, Daniel Cremers
CA
1998
IEEE
13 years 12 months ago
Real-Time Facial Animation based upon a Bank of 3D Facial Expressions
The importance of faces in human interaction explains the desire for synthetic faces as a communication vehicle in computer graphics. Unfortunately, animating a face is a very com...
C. Kouadio, Pierre Poulin, P. Lachapelle
TPHOL
1999
IEEE
13 years 12 months ago
Three Tactic Theorem Proving
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Don Syme