Sciweavers

271 search results - page 53 / 55
» A Dynamic Bayesian Network Approach to Figure Tracking using...
Sort
View
RAID
2007
Springer
14 years 5 days ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
CVPR
2010
IEEE
14 years 2 months ago
Action Unit Detection with Segment-based SVMs
Automatic facial action unit (AU) detection from video is a long-standing problem in computer vision. Two main approaches have been pursued: (1) static modeling--typically posed a...
Tomas Simon, Nguyen Minh, Fernando De la Torre, Je...
PAMI
2006
358views more  PAMI 2006»
13 years 6 months ago
Recovering 3D Human Pose from Monocular Images
We describe a learning based method for recovering 3D human body pose from single images and monocular image sequences. Our approach requires neither an explicit body model nor pri...
Ankur Agarwal, Bill Triggs
ICAC
2005
IEEE
13 years 11 months ago
Towards Autonomic Virtual Applications in the In-VIGO System
Grid environments enable users to share non-dedicated resources that lack performance guarantees. This paper describes the design of application-centric middleware components to a...
Jing Xu, Sumalatha Adabala, José A. B. Fort...
SIGMETRICS
2006
ACM
174views Hardware» more  SIGMETRICS 2006»
14 years 8 hour ago
Understanding the management of client perceived response time
Understanding and managing the response time of web services is of key importance as dependence on the World Wide Web continues to grow. We present Remote Latency-based Management...
David P. Olshefski, Jason Nieh