Sciweavers

649 search results - page 105 / 130
» State estimation of the three-tank system using a multiple m...
Sort
View
USS
2008
13 years 10 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
SIGIR
2010
ACM
13 years 11 months ago
Effective music tagging through advanced statistical modeling
Music information retrieval (MIR) holds great promise as a technology for managing large music archives. One of the key components of MIR that has been actively researched into is...
Jialie Shen, Wang Meng, Shuichang Yan, HweeHwa Pan...
CVPR
2012
IEEE
11 years 10 months ago
KNN matting
We are interested in a general alpha matting approach for the simultaneous extraction of multiple image layers; each layer may have disjoint segments for material matting not limi...
Qifeng Chen, Dingzeyu Li, Chi-Keung Tang
KES
2007
Springer
14 years 2 months ago
Fuzzy Adaptive Particle Filter for Localization of a Mobile Robot
Localization is one of the important topics in robotics and it is essential to execute a mission. Most problems in the class of localization are due to uncertainties in the modelin...
Young-Joong Kim, Chan-Hee Won, Jung-Min Pak, Myo-T...
WSCG
2004
148views more  WSCG 2004»
13 years 9 months ago
Inverse Rendering of Polished Materials under Constant Complex Uncontrolled Illumination
Inverse rendering infers realistic descriptions of illumination and material properties from photographs. However, the applicability of state of the art inverse rendering algorith...
Michael Bang Nielsen, Anders Brodersen