Sciweavers

568 search results - page 65 / 114
» Regular Polygon Detection
Sort
View
IJIPT
2010
147views more  IJIPT 2010»
13 years 6 months ago
On investigating ARP spoofing security solutions
: The Address Resolution Protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attack...
Zouheir Trabelsi, Wassim El-Hajj
INTERSPEECH
2010
13 years 2 months ago
Convexity and fast speech extraction by split bregman method
A fast speech extraction (FSE) method is presented using convex optimization made possible by pause detection of the speech sources. Sparse unmixing filters are sought by l1 regul...
Meng Yu, Wenye Ma, Jack Xin, Stanley Osher
DIMVA
2011
12 years 11 months ago
Escape from Monkey Island: Evading High-Interaction Honeyclients
Abstract. High-interaction honeyclients are the tools of choice to detect malicious web pages that launch drive-by-download attacks. Unfortunately, the approach used by these tools...
Alexandros Kapravelos, Marco Cova, Christopher Kru...
TOG
2002
128views more  TOG 2002»
13 years 7 months ago
Modelling with implicit surfaces that interpolate
We introduce new techniques for modelling with interpolating implicit surfaces. This form of implicit surface was first used for problems of surface reconstruction [24] and shape ...
Greg Turk, James F. O'Brien
CVPR
2012
IEEE
11 years 10 months ago
Discovering and exploiting 3D symmetries in structure from motion
Many architectural scenes contain symmetric or repeated structures, which can generate erroneous image correspondences during structure from motion (Sfm) computation. Prior work h...
Andrea Cohen, Christopher Zach, Sudipta N. Sinha, ...