Sciweavers

546 search results - page 57 / 110
» Using and Detecting Links in Wikipedia
Sort
View
ICCV
2007
IEEE
16 years 5 months ago
Finding a Closed Boundary by Growing Minimal Paths from a Single Point on 2D or 3D Images
In this paper, we present a new method for segmenting closed contours and surfaces. Our work builds on a variant of the Fast Marching algorithm. First, an initial point on the des...
Fethallah Benmansour, Stephane Bonneau, Laurent D....
CRV
2004
IEEE
160views Robotics» more  CRV 2004»
15 years 7 months ago
A New Integrative Approach to Time Varying Image Interpretation
- This paper presents a global method to process monocular image sequences for mobile robot obstacle detection. We do not aim to achieve a complete scene reconstruction, but only t...
Philippe Guermeur
121
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
IPPS
2010
IEEE
15 years 1 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
COMCOM
2007
149views more  COMCOM 2007»
15 years 3 months ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao