Sciweavers

841 search results - page 55 / 169
» Detection of facial features based on the relaxation algorit...
Sort
View
FI
2010
130views more  FI 2010»
13 years 6 months ago
Improving Anomaly Detection for Text-Based Protocols by Exploiting Message Structures
: Service platforms using text-based protocols need to be protected against attacks. Machine-learning algorithms with pattern matching can be used to detect even previously unknown...
Martin Güthle, Jochen Kögel, Stefan Wahl...
VR
1999
IEEE
189views Virtual Reality» more  VR 1999»
14 years 1 months ago
Cloning and Aging in a VR Family
Face cloning and animation considering wrinkle formation and aging are an aspiring goal and a challenging task. This paper describes a cloning method and an aging simulation in a ...
Won-Sook Lee, Yin Wu, Nadia Magnenat-Thalmann
ICRA
2010
IEEE
108views Robotics» more  ICRA 2010»
13 years 7 months ago
Robust place recognition for 3D range data based on point features
Abstract— The problem of place recognition appears in different mobile robot navigation problems including localization, SLAM, or change detection in dynamic environments. Wherea...
Bastian Steder, Giorgio Grisetti, Wolfram Burgard
DAC
2012
ACM
11 years 11 months ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
NIPS
1998
13 years 10 months ago
Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model
Fraud causes substantial losses to telecommunication carriers. Detection systems which automatically detect illegal use of the network can be used to alleviate the problem. Previo...
Jaakko Hollmén, Volker Tresp