Sciweavers

2990 search results - page 538 / 598
» Thresholding for Change Detection
Sort
View
MCM
2010
13 years 3 months ago
Electromagnetic interrogation and the Doppler shift using the method of mappings
We consider the electromagnetic detection of hidden moving or oscillating conductive targets. The resulting mathematical problem involves computation of a Doppler shift for an ele...
H. T. Banks, Shuhua Hu, W. Clayton Thompson
PVLDB
2010
111views more  PVLDB 2010»
13 years 3 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
TIP
2010
119views more  TIP 2010»
13 years 3 months ago
Trajectory Classification Using Switched Dynamical Hidden Markov Models
This paper proposes an approach for recognizing human activities (more specifically, pedestrian trajectories) in video sequences, in a surveillance context. A system for automatic ...
Jacinto C. Nascimento, Mário A. T. Figueire...
TITS
2010
118views Education» more  TITS 2010»
13 years 3 months ago
Vision-Based Infotainment User Determination by Hand Recognition for Driver Assistance
We present a novel real-time computer-vision system that robustly discriminates which of the front-row seat occupants is accessing the infotainment controls. The knowledge of who i...
Shinko Y. Cheng, Mohan M. Trivedi
CISS
2010
IEEE
13 years 11 days ago
Limiting false data attacks on power system state estimation
Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...