Sciweavers

2990 search results - page 538 / 598
» Thresholding for Change Detection
Sort
View
128
Voted
MCM
2010
14 years 10 months ago
Electromagnetic interrogation and the Doppler shift using the method of mappings
We consider the electromagnetic detection of hidden moving or oscillating conductive targets. The resulting mathematical problem involves computation of a Doppler shift for an ele...
H. T. Banks, Shuhua Hu, W. Clayton Thompson
148
Voted
PVLDB
2010
111views more  PVLDB 2010»
14 years 10 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
162
Voted
TIP
2010
119views more  TIP 2010»
14 years 10 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
134
Voted
TITS
2010
118views Education» more  TITS 2010»
14 years 10 months ago
Vision-Based Infotainment User Determination by Hand Recognition for Driver Assistance
We present a novel real-time computer-vision system that robustly discriminates which of the front-row seat occupants is accessing the infotainment controls. The knowledge of who i...
Shinko Y. Cheng, Mohan M. Trivedi
152
Voted
CISS
2010
IEEE
14 years 7 months ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...