Sciweavers

1202 search results - page 229 / 241
» Robust system multiangulation using subspace methods
Sort
View
CCS
2004
ACM
14 years 29 days ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
FSKD
2007
Springer
193views Fuzzy Logic» more  FSKD 2007»
14 years 1 months ago
Panoramic Background Model under Free Moving Camera
segmentation of moving regions in outdoor environment under a moving camera is a fundamental step in many vision systems including automated visual surveillance, human-machine int...
Naveed I. Rao, Huijun Di, Guangyou Xu
PODC
1999
ACM
13 years 12 months ago
Liveness-Preserving Simulation Relations
We present a new approach for reasoning about liveness properties of distributed systems, represented as automata. Our approach is based on simulation relations, and requires reas...
Paul C. Attie
KDD
2002
ACM
179views Data Mining» more  KDD 2002»
14 years 8 months ago
From Data To Insight: The Community Of Multimedia Agents
Multimedia Data Mining requires the ability to automatically analyze and understand the content. The Community of Multimedia Agents project (COMMA) is devoted to creating an open ...
Gang Wei, Valery A. Petrushin, Anatole Gershman
CVPR
2008
IEEE
14 years 9 months ago
Extrinsic and depth calibration of ToF-cameras
Recently, ToF-cameras have attracted attention because of their ability to generate a full 21 2 D depth image at video frame rates. Thus, ToF-cameras are suitable for real-time 3D...
Stefan Fuchs, Gerd Hirzinger