Sciweavers

2901 search results - page 576 / 581
» Predicting non-stationary processes
Sort
View
ESEM
2010
ACM
13 years 9 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
ICRA
2010
IEEE
145views Robotics» more  ICRA 2010»
13 years 9 months ago
Visual odometry priors for robust EKF-SLAM
— One of the main drawbacks of standard visual EKF-SLAM techniques is the assumption of a general camera motion model. Usually this motion model has been implemented in the liter...
Pablo Fernández Alcantarilla, Luis Miguel B...
ITIIS
2010
172views more  ITIIS 2010»
13 years 9 months ago
Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router
Traffic matrix-based anomaly detection and DDoS attacks detection in networks are research focus in the network security and traffic measurement community. In this paper, firstly,...
Ruoyu Yan, Qinghua Zheng, Haifei Li
JOCN
2010
104views more  JOCN 2010»
13 years 9 months ago
Spatial Attention Evokes Similar Activation Patterns for Visual and Auditory Stimuli
■ Neuroimaging studies suggest that a fronto-parietal network is activated when we expect visual information to appear at a specific spatial location. Here we examined whether a...
David V. Smith, Ben Davis, Kathy Niu, Eric W. Heal...
TASLP
2010
137views more  TASLP 2010»
13 years 9 months ago
High-Pitch Formant Estimation by Exploiting Temporal Change of Pitch
—This paper considers the problem of obtaining an accurate spectral representation of speech formant structure when the voicing source exhibits a high fundamental frequency. Our ...
Tianyu T. Wang, Thomas F. Quatieri