Sciweavers

2874 search results - page 563 / 575
» Intrusion Detection: Systems and Models
Sort
View
DEXA
2009
Springer
166views Database» more  DEXA 2009»
14 years 4 months ago
Tags4Tags: Using Tagging to Consolidate Tags
Tagging has become increasingly popular and useful across various social networks and applications. It allows users to classify and organize resources for improving the retrieval p...
Leyla Jael García-Castro, Martin Hepp, Alex...
ICRA
2008
IEEE
131views Robotics» more  ICRA 2008»
14 years 4 months ago
Towards a needle driver robot for radiofrequency ablation of tumors under continuous MRI
— This paper presents an initial design and feasibility study for a 1-DOF Magnetic Resonance Imaging (MRI) compatible needle driver robot for radiofrequency ablation (RFA). This ...
Rebecca Kokes, Kevin Lister, Rao Gullapalli, Bao Z...
IROS
2007
IEEE
189views Robotics» more  IROS 2007»
14 years 4 months ago
Person following with a mobile robot using binocular feature-based tracking
Abstract— We present the Binocular Sparse Feature Segmentation (BSFS) algorithm for vision-based person following with a mobile robot. BSFS uses Lucas-Kanade feature detection an...
Zhichao Chen, Stanley T. Birchfield
RAID
2004
Springer
14 years 3 months ago
RheoStat: Real-Time Risk Management
As the frequency of attacks faced by the average host connected to the Internet increases, reliance on manual intervention for response is decreasingly tenable. Operating system an...
Ashish Gehani, Gershon Kedem
SIGCOMM
2003
ACM
14 years 3 months ago
A knowledge plane for the internet
We propose a new objective for network research: to build a fundamentally different sort of network that can assemble itself given high level instructions, reassemble itself as re...
David D. Clark, Craig Partridge, J. Christopher Ra...