Sciweavers

1648 search results - page 124 / 330
» Where to Build a Door
Sort
View
SCIA
2007
Springer
241views Image Analysis» more  SCIA 2007»
14 years 4 months ago
Face Detection Using Multiple Cues
Many potential applications exist where a fast and robust detection of human faces is required. Different cues can be used for this purpose. Since each cue has its own pros and co...
Thomas B. Moeslund, Jess S. Petersen, Lasse D. Ska...
SGAI
2007
Springer
14 years 4 months ago
Extending Jess to Handle Uncertainty
Computer scientists are often faced with the challenge of having to model the world and its associated uncertainties. One area in particular where modelling uncertainty is importa...
David Corsar, Derek H. Sleeman, Anne McKenzie
GLOBECOM
2006
IEEE
14 years 4 months ago
A Game Theoretic Approach to Detect Network Intrusions: The Cooperative Intruders Scenario
Abstract— In this paper, we consider the problem of detecting intrusions initiated by cooperative malicious nodes in infrastructure-based networks. We achieve this objective by s...
Mona Mehrandish, Hadi Otrok, Mourad Debbabi, Chadi...
ICRA
2006
IEEE
135views Robotics» more  ICRA 2006»
14 years 4 months ago
Dynamically formed Heterogeneous Robot Teams Performing Tightly-coordinated Tasks
— As we progress towards a world where robots play an integral role in society, a critical problem that remains to be solved is the Pickup Team Challenge; that is, dynamically fo...
Edward Gil Jones, Brett Browning, M. Bernardine Di...
ISESE
2006
IEEE
14 years 4 months ago
Identifying domain-specific defect classes using inspections and change history
We present an iterative, reading-based methodology for analyzing defects in source code when change history is available. Our bottom-up approach can be applied to build knowledge ...
Taiga Nakamura, Lorin Hochstein, Victor R. Basili