Sciweavers

34 search results - page 6 / 7
» Pattern matching in pseudo real-time
Sort
View
ICRA
2006
IEEE
93views Robotics» more  ICRA 2006»
13 years 11 months ago
Robot Navigation using 1D Panoramic Images
— This paper presents a new method for navigation and localization of a mobile robot equipped with an omnidirectional camera. We represent the environment using a collection of o...
Amy J. Briggs, Yunpeng Li, Daniel Scharstein, Matt...
PR
2010
220views more  PR 2010»
13 years 3 months ago
Online finger-knuckle-print verification for personal authentication
Biometric based personal authentication is an effective method for automatically recognizing, with a high confidence, a person’s identity. By observing that the texture pattern p...
Lin Zhang, Lei Zhang 0006, David Zhang, Hailong Zh...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 3 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
RTAS
2005
IEEE
13 years 11 months ago
Bounding Worst-Case Data Cache Behavior by Analytically Deriving Cache Reference Patterns
While caches have become invaluable for higher-end architectures due to their ability to hide, in part, the gap between processor speed and memory access times, caches (and partic...
Harini Ramaprasad, Frank Mueller
DMIN
2006
141views Data Mining» more  DMIN 2006»
13 years 6 months ago
Extracting Forensic Explanation from Intrusion Alerts
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
Bon Sy, Negmat Mullodzhanov