Sciweavers

2236 search results - page 329 / 448
» Intrusion detection techniques and approaches
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Tracking Code Clones in Evolving Software
Code clones are generally considered harmful in software development, and the predominant approach is to try to eliminate them through refactoring. However, recent research has pr...
Ekwa Duala-Ekoko, Martin P. Robillard
ICRA
2009
IEEE
165views Robotics» more  ICRA 2009»
14 years 3 months ago
A visual odometry framework robust to motion blur
— Motion blur is a severe problem in images grabbed by legged robots and, in particular, by small humanoid robots. Standard feature extraction and tracking approaches typically f...
Alberto Pretto, Emanuele Menegatti, Maren Bennewit...
ICFEM
2009
Springer
14 years 3 months ago
Scalable Multi-core Model Checking Fairness Enhanced Systems
Rapid development in hardware industry has brought the prevalence of multi-core systems with shared-memory, which enabled the speedup of various tasks by using parallel algorithms....
Yang Liu 0003, Jun Sun 0001, Jin Song Dong
IH
2009
Springer
14 years 3 months ago
Microphone Classification Using Fourier Coefficients
Media forensics tries to determine the originating device of a signal. We apply this paradigm to microphone forensics, determining the microphone model used to record a given audio...
Robert Buchholz, Christian Krätzer, Jana Ditt...
ISVC
2009
Springer
14 years 3 months ago
Focused Volumetric Visual Hull with Color Extraction
Abstract. This paper introduces a new approach for volumetric visual hull reconstruction, using a voxel grid that focuses on the moving target object. This grid is continuously upd...
Daniel Knoblauch, Falko Kuester