Sciweavers

19 search results - page 2 / 4
» A Hybrid Approach to Face Detection under Unconstrained Envi...
Sort
View
IROS
2009
IEEE
146views Robotics» more  IROS 2009»
13 years 11 months ago
Robust constraint-consistent learning
— Many everyday human skills can be framed in terms of performing some task subject to constraints imposed by the environment. Constraints are usually unobservable and frequently...
Matthew Howard, Stefan Klanke, Michael Gienger, Ch...
SECPERU
2006
IEEE
13 years 11 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
EUROMICRO
2004
IEEE
13 years 8 months ago
Intrusion Detection in Virtual Machine Environments
A virtual machine is a software replica of an underlying real machine. Multiple virtual machines can operate on the same host machine concurrently, without interfere each other. S...
Marcos Laureano, Carlos Maziero, Edgard Jamhour
PEPM
2009
ACM
13 years 9 months ago
Clone detection and removal for Erlang/OTP within a refactoring environment
A well-known bad code smell in refactoring and software maintenance is duplicated code, or code clones. A code clone is a code fragment that is identical or similar to another. Un...
Huiqing Li, Simon Thompson
FGR
2002
IEEE
151views Biometrics» more  FGR 2002»
13 years 10 months ago
Fast Stereo-Based Head Tracking for Interactive Environments
We present a robust implementation of stereo-based head tracking designed for interactive environments with uncontrolled lighting. We integrate fast face detection and drift reduc...
Louis-Philippe Morency, Ali Rahimi, Neal Checka, T...