Sciweavers

2236 search results - page 405 / 448
» Intrusion detection techniques and approaches
Sort
View
IBPRIA
2007
Springer
14 years 3 months ago
Improving Piecewise-Linear Registration Through Mesh Optimization
Abstract. Piecewise-linear methods accomplish the registration by dividing the images in corresponding triangular patches, which are individually mapped through affine transformati...
Vicente Arévalo, Javier González
IBPRIA
2007
Springer
14 years 3 months ago
Bayesian Oil Spill Segmentation of SAR Images Via Graph Cuts
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
Sónia Pelizzari, José M. Bioucas-Dia...
IH
2007
Springer
14 years 3 months ago
YASS: Yet Another Steganographic Scheme That Resists Blind Steganalysis
Abstract. A new, simple, approach for active steganography is proposed in this paper that can successfully resist recent blind steganalysis methods, in addition to surviving distor...
Kaushal Solanki, Anindya Sarkar, B. S. Manjunath
ICRA
2006
IEEE
154views Robotics» more  ICRA 2006»
14 years 3 months ago
Qualitative Vision-based Mobile Robot Navigation
— We present a novel, simple algorithm for mobile robot navigation. Using a teach-replay approach, the robot is manually led along a desired path in a teaching phase, then the ro...
Zhichao Chen, Stanley T. Birchfield
ISSTA
2006
ACM
14 years 3 months ago
Architecture-driven platform independent deterministic replay for distributed hard real-time systems
Distributed hard real-time systems have become a major component of many advanced technical products. Means to ensure their proper quality are thus of paramount importance. To ens...
Holger Giese, Stefan Henkler