Sciweavers

1804 search results - page 287 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
AAAI
2011
12 years 9 months ago
Understanding Natural Language Commands for Robotic Navigation and Mobile Manipulation
This paper describes a new model for understanding natural language commands given to autonomous systems that perform navigation and mobile manipulation in semi-structured environ...
Stefanie Tellex, Thomas Kollar, Steven Dickerson, ...
MMSEC
2006
ACM
102views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Zero-knowledge watermark detector robust to sensitivity attacks
Current zero-knowledge watermark detectors are based on a linear correlation between the asset features and a given secret sequence. This detection function is susceptible of bein...
Juan Ramón Troncoso-Pastoriza, Fernando P&e...
WACV
2005
IEEE
14 years 2 months ago
Persistent Objects Tracking Across Multiple Non Overlapping Cameras
We present an approach for persistent tracking of moving objects observed by non-overlapping and moving cameras. Our approach robustly recovers the geometry of non-overlapping vie...
Jinman Kang, Isaac Cohen, Gérard G. Medioni
CVPR
2003
IEEE
14 years 2 months ago
Continuous Tracking Within and Across Camera Streams
This paper presents a new approach for continuous tracking of moving objects observed by multiple, heterogeneous cameras. Our approach simultaneously processes video streams from ...
Jinman Kang, Isaac Cohen, Gérard G. Medioni
MOBISYS
2004
ACM
14 years 8 months ago
Mimic: Raw Activity Shipping for File Synchronization in Mobile File Systems
In this paper, we consider the problem of file synchronization when a mobile host shares files with a backbone file server in a network file system. Several diff schemes have been...
Tae-Young Chang, Aravind Velayutham, Raghupathy Si...