Sciweavers

11718 search results - page 2103 / 2344
» Testing database applications
Sort
View
PST
2008
15 years 3 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
MVA
2007
132views Computer Vision» more  MVA 2007»
15 years 3 months ago
A Robust Coarse-to-Fine Method for Pupil Localization in Non-ideal Eye Images
Pupil localization is a very important preprocessing step in many machine vision applications. Accurate and robust pupil localization especially in non-ideal eye images (such as i...
Xiaoyan Yuan, Pengfei Shi
NIPS
2007
15 years 3 months ago
Predicting Brain States from fMRI Data: Incremental Functional Principal Component Regression
We propose a method for reconstruction of human brain states directly from functional neuroimaging data. The method extends the traditional multivariate regression analysis of dis...
Sennay Ghebreab, Arnold W. M. Smeulders, Pieter W....
NIPS
2007
15 years 3 months ago
Discovering Weakly-Interacting Factors in a Complex Stochastic Process
Dynamic Bayesian networks are structured representations of stochastic processes. Despite their structure, exact inference in DBNs is generally intractable. One approach to approx...
Charlie Frogner, Avi Pfeffer
131
Voted
RSS
2007
158views Robotics» more  RSS 2007»
15 years 3 months ago
Vision-Aided Inertial Navigation for Precise Planetary Landing: Analysis and Experiments
Abstract—In this paper, we present the analysis and experimental validation of a vision-aided inertial navigation algorithm for planetary landing applications. The system employs...
Anastasios I. Mourikis, Nikolas Trawny, Stergios I...
« Prev « First page 2103 / 2344 Last » Next »