Sciweavers

988 search results - page 148 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
ICRA
1994
IEEE
90views Robotics» more  ICRA 1994»
14 years 1 months ago
Pursuing Projections: Keeping a Robot on Path
For an autonomous robot navigating in an unstructured outdoor environment, staying close to a path is crucial to successfully reaching its goal. Although the degree of accuracy wi...
Karen T. Sutherland, William B. Thompson
APPROX
2007
Springer
86views Algorithms» more  APPROX 2007»
14 years 28 days ago
Lower Bounds for Swapping Arthur and Merlin
We prove a lower bound for swapping the order of Arthur and Merlin in two-round MerlinArthur games using black-box techniques. Namely, we show that any AM-game requires time (t2 )...
Scott Diehl
CONEXT
2007
ACM
14 years 26 days ago
Identifying dynamic IP address blocks serendipitously through background scanning traffic
Today's Internet contains a large portion of "dynamic" IP addresses, which are assigned to clients upon request. A significant amount of malicious activities have b...
Yu Jin, Esam Sharafuddin, Zhi-Li Zhang
ACIVS
2006
Springer
14 years 20 days ago
Robust Analysis of Silhouettes by Morphological Size Distributions
We address the topic of real-time analysis and recognition of silhouettes. The method that we propose first produces object features obtained by a new type of morphological operato...
Olivier Barnich, Sébastien Jodogne, Marc Va...
FGR
2004
IEEE
161views Biometrics» more  FGR 2004»
14 years 19 days ago
AdaBoost with Totally Corrective Updates for Fast Face Detection
An extension of the AdaBoost learning algorithm is proposed and brought to bear on the face detection problem. In each weak classifier selection cycle, the novel totally correctiv...
Jan Sochman, Jiri Matas