Sciweavers

2236 search results - page 319 / 448
» Intrusion detection techniques and approaches
Sort
View
MVA
2007
211views Computer Vision» more  MVA 2007»
13 years 10 months ago
Shadow Elimination in Traffic Video Segmentation
Shadow detection is critical for robust and reliable vision-based systems for traffic vision analysis. Shadow points are often misclassified as object points causing errors in loc...
Hong Liu, Jintao Li, Qun Liu, Yueliang Qian
CSREAESA
2009
13 years 10 months ago
Embedded Processor Based Fault Injection and SEU Emulation for FPGAs
Two embedded processor based fault injection case studies are presented which are applicable to Field Programmable Gate Arrays (FPGAs) and FPGA cores in configurable System-on-Chip...
Bradley F. Dutton, Mustafa Ali, Charles E. Stroud,...
CSL
2002
Springer
13 years 9 months ago
Recognition confidence scoring and its use in speech understanding systems
In this paper we present an approach to recognition confidence scoring and a set of techniques for integrating confidence scores into the understanding and dialogue components of ...
Timothy J. Hazen, Stephanie Seneff, Joseph Polifro...
DASIP
2010
13 years 4 months ago
Automated generation of an efficient MPEG-4 Reconfigurable Video Coding decoder implementation
This paper proposes an automatic design flow from userfriendly design to efficient implementation of video processing systems. This design flow starts with the use of coarsegrain ...
Ruirui Gu, Jonathan Piat, Mickaël Raulet, J&o...
TIP
2010
121views more  TIP 2010»
13 years 4 months ago
Robust Processing of Optical Flow of Fluids
Abstract--This paper proposes a new approach, coupling physical models and image estimation techniques, for modelling the movement of fluids. The fluid flow is characterized by tur...
Ashish Doshi, Adrian G. Bors