Sciweavers

112 search results - page 15 / 23
» Polynomial-time solution of change detection problems
Sort
View
HUMAN
2003
Springer
13 years 12 months ago
A Study on Monitoring and Protecting Computer System against Interception Threat
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has no...
Seongje Cho, Chulyean Chang, Joonmo Kim, Jongmoo C...
ICIP
2008
IEEE
14 years 1 months ago
Dynamic background modeling and subtraction using spatio-temporal local binary patterns
Traditional background modeling and subtraction methods have a strong assumption that the scenes are of static structures with limited perturbation. These methods will perform poo...
Shengping Zhang, Hongxun Yao, Shaohui Liu
IROS
2007
IEEE
108views Robotics» more  IROS 2007»
14 years 1 months ago
Hiding the acoustic signature of a mobile robot
—A mobile robot can be a rather significant source of noise: noisy fans cool onboard computers, motors are spinning, rubber wheels are squeaking against the floor, and mechanical...
Eric Martinson
AINA
2010
IEEE
13 years 11 months ago
Active Data Selection for Sensor Networks with Faults and Changepoints
Abstract—We describe a Bayesian formalism for the intelligent selection of observations from sensor networks that may intermittently undergo faults or changepoints. Such active d...
Michael A. Osborne, Roman Garnett, Stephen J. Robe...
MCM
2010
13 years 1 months ago
Electromagnetic interrogation and the Doppler shift using the method of mappings
We consider the electromagnetic detection of hidden moving or oscillating conductive targets. The resulting mathematical problem involves computation of a Doppler shift for an ele...
H. T. Banks, Shuhua Hu, W. Clayton Thompson