Sciweavers

283 search results - page 9 / 57
» Exploiting Immunological Properties for Ubiquitous Computing...
Sort
View
ICPR
2010
IEEE
14 years 2 months ago
Exploiting Visual Quasi-Periodicity for Automated Chewing Event Detection Using Active Appearance Models and Support Vector Mach
We present a method that automatically detects chewing events in surveillance video of a subject. Firstly, an Active Appearance Model (AAM) is used to track a subject’s face acr...
Steven Cadavid, Mohamed Abdel-Mottaleb
ITS
2010
Springer
139views Multimedia» more  ITS 2010»
13 years 5 months ago
A Coordinate Geometry Learning Environment with Game-Like Properties
Mily's World is a learning environment for coordinate geometry that has game-like properties, that is, elements of games that are engaging such as cover story, graphical repre...
Dovan Rai, Joseph E. Beck, Neil T. Heffernan
USS
2010
13 years 5 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
HYBRID
2007
Springer
14 years 1 months ago
Computational Approaches to Reachability Analysis of Stochastic Hybrid Systems
This work investigates some of the computational issues involved in the solution of probabilistic reachability problems for discretetime, controlled stochastic hybrid systems. It i...
Alessandro Abate, Saurabh Amin, Maria Prandini, Jo...