Sciweavers

6553 search results - page 1183 / 1311
» Face modeling for recognition
Sort
View
RAID
1999
Springer
15 years 9 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
125
Voted
SIGOPSE
1998
ACM
15 years 9 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
EUROPAR
1997
Springer
15 years 8 months ago
Modulo Scheduling with Cache Reuse Information
Instruction scheduling in general, and software pipelining in particular face the di cult task of scheduling operations in the presence of uncertain latencies. The largest contrib...
Chen Ding, Steve Carr, Philip H. Sweany
FGR
2004
IEEE
170views Biometrics» more  FGR 2004»
15 years 8 months ago
3D Shape Constraint for Facial Feature Localization Using Probabilistic-like Output
This paper presents a method to automatically locate facial feature points under large variations in pose, illumination and facial expressions. First we propose a method to calcul...
Longbin Chen, Lei Zhang, HongJiang Zhang, Mohamed ...
AAAI
2007
15 years 7 months ago
A Modal Logic for Beliefs and Pro Attitudes
Agents’ pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural an...
Kaile Su, Abdul Sattar, Han Lin, Mark Reynolds
« Prev « First page 1183 / 1311 Last » Next »