Sciweavers

2012 search results - page 34 / 403
» Lane-Change Detection Using a Computational Driver Model
Sort
View
CCS
2004
ACM
14 years 1 months ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
PERVASIVE
2009
Springer
14 years 2 months ago
Realistic Driving Trips For Location Privacy
Simulated, false location reports can be an effective way to confuse a privacy attacker. When a mobile user must transmit his or her location to a central server, these location re...
John Krumm
CVPR
2011
IEEE
13 years 2 months ago
Illumination Estimation and Cast Shadow Detection through a Higher-order Graphical Model
In this paper, we propose a novel framework to jointly recover the illumination environment and an estimate of the cast shadows in a scene from a single image, given coarse 3D geo...
Alexandros Panagopoulos, Chaohui Wang, Dimitris Sa...
TACAS
2009
Springer
144views Algorithms» more  TACAS 2009»
14 years 7 days ago
Computing Optimized Representations for Non-convex Polyhedra by Detection and Removal of Redundant Linear Constraints
Abstract. We present a method which computes optimized representations for non-convex polyhedra. Our method detects so-called redundant linear constraints in these representations ...
Christoph Scholl, Stefan Disch, Florian Pigorsch, ...
RSCTC
2000
Springer
122views Fuzzy Logic» more  RSCTC 2000»
13 years 11 months ago
Computer Vision Using Fuzzy Logic for Robot Manipulator
: This paper presents a Lab. implementation of a computer vision using fuzzy models for pattern recognition for the detection of boundaries in images obtained through a camera inst...
Adriano Breunig, Haroldo R. de Azevedo, Edilberto ...