Sciweavers

769 search results - page 35 / 154
» Identifying objects in legacy systems
Sort
View
DBSEC
2009
124views Database» more  DBSEC 2009»
13 years 8 months ago
Towards System Integrity Protection with Graph-Based Policy Analysis
Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn
USITS
2001
13 years 9 months ago
CANS: Composable, Adaptive Network Services Infrastructure
Ubiquitous access to sophisticated internet services from diverse end devices across heterogeneous networks requires the injection of additional functionality into the network to ...
Xiaodong Fu, Weisong Shi, Anatoly Akkerman, Vijay ...
DAGM
2005
Springer
14 years 1 months ago
Vision-Based 3D Object Localization Using Probabilistic Models of Appearance
The ability to accurately localize objects in an observed scene is regarded as an important precondition for many practical applications including automatic manufacturing, quality ...
Christian Plagemann, Thomas Müller, Wolfram B...
ICRA
2008
IEEE
158views Robotics» more  ICRA 2008»
14 years 2 months ago
Informed visual search: Combining attention and object recognition
Abstract— This paper studies the sequential object recognition problem faced by a mobile robot searching for specific objects within a cluttered environment. In contrast to curr...
Per-Erik Forssén, David Meger, Kevin Lai, S...
HICSS
1997
IEEE
110views Biometrics» more  HICSS 1997»
13 years 12 months ago
Enhancing Object-Oriented Modeling with Concepts to
This paper will present an approach that fosters a seamless integration of documents with corporate information systems. It is based on a conceptually enhanced notion of documents...
Ulrich Frank