Sciweavers

10797 search results - page 1957 / 2160
» Robust control applications
Sort
View
128
Voted
PST
2008
15 years 5 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
MVA
2007
193views Computer Vision» more  MVA 2007»
15 years 5 months ago
A Video Motion Capture System for Interactive Games
This paper presents a method for markerless human motion capture using a single camera. It uses tree-based filtering to efficiently propagate a probability distribution over pos...
Ryuzo Okada, Nobuhiro Kondoh, Björn Stenger
NIPS
2007
15 years 5 months ago
Modelling motion primitives and their timing in biologically executed movements
Biological movement is built up of sub-blocks or motion primitives. Such primitives provide a compact representation of movement which is also desirable in robotic control applica...
Ben H. Williams, Marc Toussaint, Amos J. Storkey
129
Voted
SPLC
2008
15 years 5 months ago
Towards Separation of Concerns in Model Transformation Workflows
Model-driven software product lines are an emerging topic in research and industry, as they promise higher development speed and easier adaptability to customer needs. The generat...
Christoph Elsner, Daniel Lohmann, Wolfgang Schr&ou...
137
Voted
SDL
2007
152views Hardware» more  SDL 2007»
15 years 5 months ago
TTCN-3 Quality Engineering: Using Learning Techniques to Evaluate Metric Sets
Software metrics are an essential means to assess software quality. For the assessment of software quality, typically sets of complementing metrics are used since individual metric...
Edith Werner, Jens Grabowski, Helmut Neukirchen, N...
« Prev « First page 1957 / 2160 Last » Next »