Sciweavers

2236 search results - page 325 / 448
» Intrusion detection techniques and approaches
Sort
View
IVC
2006
115views more  IVC 2006»
13 years 9 months ago
A motion-based scene tree for compressed video content management
This paper describes a fully automatic content-based approach for browsing and retrieval of MPEG-2 compressed video. The first step of the approach is the detection of shot bounda...
Haoran Yi, Deepu Rajan, Liang-Tien Chia
ICRA
2010
IEEE
108views Robotics» more  ICRA 2010»
13 years 7 months ago
Robust place recognition for 3D range data based on point features
Abstract— The problem of place recognition appears in different mobile robot navigation problems including localization, SLAM, or change detection in dynamic environments. Wherea...
Bastian Steder, Giorgio Grisetti, Wolfram Burgard
DAC
2012
ACM
11 years 11 months ago
On software design for stochastic processors
Much recent research [8, 6, 7] suggests significant power and energy benefits of relaxing correctness constraints in future processors. Such processors with relaxed constraints ...
Joseph Sloan, John Sartori, Rakesh Kumar
ICIP
2000
IEEE
14 years 11 months ago
Discovering Recurrent Visual Semantics in Consumer Photographs
We present techniques to semi-automatically discover Recurrent Visual Semantics (RVS) -the repetitive appearance of visually similar elements such as objects and scenes- in consum...
Alejandro Jaimes, Ana B. Benitez, Shih-Fu Chang, A...
DAC
2005
ACM
14 years 10 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir