Sciweavers

2125 search results - page 200 / 425
» Points with Type-2 Operations
Sort
View
INFOCOM
2003
IEEE
15 years 9 months ago
Detecting Network Intrusions via Sampling: A Game Theoretic Approach
In this paper, we consider the problem of detecting an intruding packet in a communication network. Detection is accomplished by sampling a portion of the packets transiting selec...
Murali S. Kodialam, T. V. Lakshman
114
Voted
HRI
2010
ACM
15 years 9 months ago
Recognizing engagement in human-robot interaction
—Based on a study of the engagement process between humans, we have developed and implemented an initial computational model for recognizing engagement between a human and a huma...
Charles Rich, Brett Ponsleur, Aaron Holroyd, Canda...
APSEC
2002
IEEE
15 years 9 months ago
Contextual Matching of Software Library Components
Many automated programming environments construct software by integrating predefined components from a software library. A fundamental challenge in this process is to match the p...
Colin J. Fidge
109
Voted
CW
2002
IEEE
15 years 9 months ago
A Practical Image Retouching Method
In this paper, we present a novel fast algorithmfor image retouching. A space-mapping technique is used to transform a missing (or damaged) part of a surface into a different shap...
Vladimir V. Savchenko, Nikita Kojekine, Hiroshi Un...
129
Voted
GI
2009
Springer
15 years 8 months ago
Mobile computing in mass casualty incidents (MCIs)
: This paper illustrates the future role of mobile computing for the response in emergencies and mass casualty incidents (MCIs). Furthermore it describes the different components a...
Simon Nestler, Gudrun Klinker