Sciweavers

326 search results - page 53 / 66
» Testing malware detectors
Sort
View
NDSS
2009
IEEE
14 years 2 months ago
Coordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we prese...
Carrie Gates
IROS
2009
IEEE
129views Robotics» more  IROS 2009»
14 years 2 months ago
Using symmetrical regions of interest to improve visual SLAM
— Simultaneous Localization and Mapping (SLAM) based on visual information is a challenging problem. One of the main problems with visual SLAM is to find good quality landmarks,...
Gert Kootstra, Lambert Schomaker
ICASSP
2008
IEEE
14 years 2 months ago
AN EM-based probabilistic approach for Acoustic Echo Suppression
This paper introduces a new Acoustic Echo Suppression (AES) algorithm for suppressing the residual echo after the Acoustic Echo Canceller (AEC). By temporally segmenting the frequ...
Nilesh Madhu, Ivan Tashev, Alex Acero
ICPR
2008
IEEE
14 years 2 months ago
Tongue line extraction
Tongue line refers to the surface of the tongue covered with fissures or lines in deep or shallow shape and is one type of important features in clinical practice of Traditional ...
Laura Li Liu, David Zhang, Ajay Kumar, Xiangqian W...
ICPR
2008
IEEE
14 years 2 months ago
Bayesian sequential face detection with automatic re-initialization
This paper proposes a probabilistic search algorithm to boost the computational efficiency of face detection in video sequences. The algorithm sequentially predicts the probabili...
Atsushi Matsui, Simon Clippingdale, Takashi Matsum...