Sciweavers

8828 search results - page 1616 / 1766
» Formal methods in practice
Sort
View
ACSAC
2007
IEEE
15 years 10 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
HICSS
2007
IEEE
86views Biometrics» more  HICSS 2007»
15 years 10 months ago
Visualization and Characterization of Stability Swings via GPS-Synchronized Data
: This paper provides a methodology to characterize the accuracy of PMU data (GPS-synchronized) and the applicability of this data for monitoring system stability via visualization...
George J. Cokkinides, A. P. Sakis Meliopoulos, Geo...
INFOCOM
2007
IEEE
15 years 10 months ago
The Impact of Stochastic Noisy Feedback on Distributed Network Utility Maximization
—The implementation of distributed network utility maximization (NUM) algorithms hinges heavily on information feedback through message passing among network elements. In practic...
Junshan Zhang, Dong Zheng, Mung Chiang
IROS
2007
IEEE
210views Robotics» more  IROS 2007»
15 years 10 months ago
Extrinsic self calibration of a camera and a 3D laser range finder from natural scenes
— In this paper, we describe a new approach for the extrinsic calibration of a camera with a 3D laser range finder, that can be done on the fly. This approach does not require an...
Davide Scaramuzza, Ahad Harati, Roland Siegwart
145
Voted
CIVR
2007
Springer
195views Image Analysis» more  CIVR 2007»
15 years 10 months ago
Towards optimal bag-of-features for object categorization and semantic video retrieval
Bag-of-features (BoF) deriving from local keypoints has recently appeared promising for object and scene classification. Whether BoF can naturally survive the challenges such as ...
Yu-Gang Jiang, Chong-Wah Ngo, Jun Yang 0003
« Prev « First page 1616 / 1766 Last » Next »