Sciweavers

1029 search results - page 182 / 206
» Learning Based System for Detection and Tracking of Vehicles
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 1 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
PETRA
2009
ACM
14 years 2 months ago
Identifying people in camera networks using wearable accelerometers
We propose a system to identify people in a sensor network. The system fuses motion information measured from wearable accelerometer nodes with motion traces of each person detect...
Thiago Teixeira, Deokwoo Jung, Gershon Dublon, And...
ACHI
2008
IEEE
14 years 2 months ago
NALP: Navigating Assistant for Large Display Presentation Using Laser Pointer
In this paper, we present NALP (Navigating Assistant using Laser Pointer), a novel interaction technique for large display presentation control. NALP is based on laser dot detecti...
Liang Zhang, Yuanchun Shi, Boliang Chen
ICC
2007
IEEE
164views Communications» more  ICC 2007»
14 years 2 months ago
A Framework of Attacker Centric Cyber Attack Behavior Analysis
—Cyber attack behavior analysis can be roughly classified as “network centric” and “attacker centric” approaches. Compared with traditional “network centric” approach...
Xuena Peng, Hong Zhao
MICAI
2000
Springer
13 years 11 months ago
Verification of Correct Pronunciation of Mexican Spanish Using Speech Technology
This paper presents a new method for the verification of the correct pronunciation of spoken words. This process is based on speech recognition technology. It can be particularly ...
Ingrid Kirschning, Nancy Aguas