Sciweavers

2236 search results - page 288 / 448
» Intrusion detection techniques and approaches
Sort
View
ICASSP
2009
IEEE
14 years 5 months ago
Rate efficient remote video file synchronization
Video file synchronization between remote users is an important task in many applications. Re-transmission of a video that has been only slightly modified is expensive, wasteful...
Hao Zhang, Chuohao Yeo, Kannan Ramchandran
IROS
2009
IEEE
156views Robotics» more  IROS 2009»
14 years 5 months ago
Multi-robot SLAM using ceiling vision
— In this paper we present a new vision-based SLAM approach for multi-robot formulation. For a cooperative map reconstruction, the robots have to know each other’s relative pos...
Hee Seok Lee, Kyoung Mu Lee
CDC
2008
IEEE
115views Control Systems» more  CDC 2008»
14 years 5 months ago
Simultaneous observer based sensor diagnosis and speed estimation of Unmanned Aerial Vehicle
In this contribution we investigate the problem of simultaneous observer based sensor diagnosis and speed estimation of Unmanned Aerial Vehicle (UAV). The main features lie in the...
Hugues Rafaralahy, Edouard Richard, M. Boutayeb, M...
IBPRIA
2007
Springer
14 years 4 months ago
Breast Skin-Line Segmentation Using Contour Growing
This paper presents a novel methodology to obtain the breast skin line in mammographic images. The breast edge provides important information of the breast shape and deformation wh...
Robert Marti, Arnau Oliver, David Raba, Jordi Frei...
CSMR
2005
IEEE
14 years 4 months ago
Discovering Unanticipated Dependency Schemas in Class Hierarchies
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Gabriela Arévalo, Stéphane Ducasse, ...