Sciweavers

226 search results - page 35 / 46
» Model-Based Control
Sort
View
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICARCV
2008
IEEE
154views Robotics» more  ICARCV 2008»
14 years 4 months ago
Teaching a robot to operate a lift
—This paper discusses a vision problem for the detection of lift operation panel which is a plane subject to deformation due to viewing angle change. The key problem in this proj...
Han Wang, Y. Ying, V. P. Dinh, B. Y. Xie, Danwei W...
ICNS
2008
IEEE
14 years 4 months ago
DiProNN: Distributed Programmable Network Node Architecture
The programmable network approach allows processing of passing user data in a network, which is highly suitable especially for multimedia streams processing. However, programming ...
Tomás Rebok
ICPR
2008
IEEE
14 years 4 months ago
Lennard-Jones force field for Geometric Active Contour
This paper presents a new Geometric Active Contour (GAC) model based on Lennard-Jones (L-J) force field, which is inspired by the theory of intermolecular interaction. It is diff...
Zhenglong Li, Qingshan Liu, Hanqing Lu, Dimitris N...
PIMRC
2008
IEEE
14 years 4 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng