Sciweavers

495 search results - page 69 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
ICASSP
2008
IEEE
14 years 4 months ago
3D facial expression recognition using swarm intelligence
In this paper, we present a novel approach for 3D facial expression recognition which is inspired by the advances of ant colony and particle swarm optimization (ACO and PSO respec...
Iordanis Mpiperis, Sotiris Malassiotis, Vassilios ...
PREMI
2005
Springer
14 years 3 months ago
Hybrid Hierarchical Learning from Dynamic Scenes
The work proposes a hierarchical architecture for learning amic scenes at various levels of knowledge abstraction. The raw visual information is processed at different stages to g...
Prithwijit Guha, Pradeep Vaghela, Pabitra Mitra, K...
CVPR
2006
IEEE
14 years 11 months ago
Intelligent Collaborative Tracking by Mining Auxiliary Objects
Many tracking methods face a fundamental dilemma in practice: tracking has to be computationally efficient but verifying if or not the tracker is following the true target tends t...
Ming Yang, Ying Wu, Shihong Lao
ICIP
2004
IEEE
14 years 11 months ago
Estimation of attacker's scale and noise variance for qim-dc watermark embedding
Quantization-based watermarking schemes are vulnerable to amplitude scaling. Therefore, the scaling factor needs to be estimated at the decoder side, such that the received (attac...
Reginald L. Lagendijk, Ivo D. Shterev
ICINCO
2004
122views Robotics» more  ICINCO 2004»
13 years 11 months ago
Data Security Considerations in Modern Automation Networks
: The automation manufacturing business has reached its turning point and manufacturers are forced to create new business areas. Their expertise about field devices will be the sou...
Mikko Salmenperä, Jari Seppälä