Sciweavers

1282 search results - page 221 / 257
» Signing on signing off
Sort
View
BMVC
2010
13 years 7 months ago
Local Gaussian Processes for Pose Recognition from Noisy Inputs
Gaussian processes have been widely used as a method for inferring the pose of articulated bodies directly from image data. While able to model complex non-linear functions, they ...
Martin Fergie, Aphrodite Galata
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
13 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
GLOBECOM
2010
IEEE
13 years 7 months ago
A Distributed Public Key Caching Scheme in Large Wireless Networks
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
Yuan Kong, Jing Deng, Stephen R. Tate
ICIP
2010
IEEE
13 years 7 months ago
Rotation invariant texture classification using adaptive LBP with directional statistical features
Local Binary Pattern (LBP) has been widely used in texture classification because of its simplicity and computational efficiency. Traditional LBP codes the sign of the local diffe...
Zhenhua Guo, Lei Zhang, David Zhang, Su Zhang
IMC
2010
ACM
13 years 7 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...