Sciweavers

2564 search results - page 339 / 513
» Human Computer Interaction Based Intrusion Detection
Sort
View
ICPR
2004
IEEE
14 years 9 months ago
Probabilistic Classification Between Foreground Objects and Background
Tracking of deformable objects like humans is a basic operation in many surveillance applications. Objects are detected as they enter the field of view of the camera and they are ...
Paul J. Withagen, Klamer Schutte, Frans C. A. Groe...
CHI
2009
ACM
14 years 9 months ago
Exploring video streams using slit-tear visualizations
Slit-tear visualizations allow users to selectively visualize pixel paths in a video scene. The slit-tear visualization technique is a generalization of the traditional photograph...
Anthony Tang, Saul Greenberg, Sidney Fels
CSFW
2007
IEEE
14 years 2 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
HRI
2006
ACM
14 years 2 months ago
Working with robots and objects: revisiting deictic reference for achieving spatial common ground
Robust joint visual attention is necessary for achieving a common frame of reference between humans and robots interacting multimodally in order to work together on realworld spat...
Andrew G. Brooks, Cynthia Breazeal
HAPTICS
2003
IEEE
14 years 1 months ago
Levels of Detail in Reducing Cost of Haptic Rendering: A Preliminary User Study
Haptic rendering complex objects in virtual environments is computationally intensive. In this paper we start the investigation of a new category of approach to reducing the compu...
Jian Zhang, Shahram Payandeh, John Dill