Sciweavers

1539 search results - page 275 / 308
» Fast and Simple Methods For Computing Control Points
Sort
View
INFOCOM
2002
IEEE
14 years 16 days ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin
DICTA
2003
13 years 9 months ago
3D Face Recognition Using Longitudinal Section and Transection
In this paper, a new practical implementation of a person verification system using features of longitudinal section and transection and other facial, rotation compensated 3D face ...
Yeung-hak Lee
ICRA
2010
IEEE
142views Robotics» more  ICRA 2010»
13 years 6 months ago
A quadratic regulator-based heuristic for rapidly exploring state space
Abstract— Kinodynamic planning algorithms like RapidlyExploring Randomized Trees (RRTs) hold the promise of finding feasible trajectories for rich dynamical systems with complex...
Elena Leah Glassman, Russ Tedrake
PCM
2010
Springer
193views Multimedia» more  PCM 2010»
13 years 6 months ago
Color Spectrum Normalization: Saliency Detection Based on Energy Re-allocation
Spectrum normalization is a process shared by two saliency detection methods, Spectral Residual (SR) and Phase Fourier Transform (PFT). In this paper, we point out that the essence...
Zhuoliang Kang, Junping Zhang
EMNLP
2009
13 years 5 months ago
Generating High-Coverage Semantic Orientation Lexicons From Overtly Marked Words and a Thesaurus
Sentiment analysis often relies on a semantic orientation lexicon of positive and negative words. A number of approaches have been proposed for creating such lexicons, but they te...
Saif Mohammad, Cody Dunne, Bonnie J. Dorr