Sciweavers

399 search results - page 74 / 80
» A Face Recognition System Based on Local Feature Characteriz...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
AAAI
2006
14 years 11 months ago
A Multi Agent Approach to Vision Based Robot Scavenging
This paper proposes a design for our entry into the 2006 AAAI Scavenger Hunt Competition and Robot Exhibition. We will be entering a scalable two agent system consisting of off-th...
Kamil Wnuk, Brian Fulkerson, Jeremi Sudol
SIGOPSE
1998
ACM
15 years 1 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
ECCV
2006
Springer
15 years 11 months ago
Robust Attentive Behavior Detection by Non-linear Head Pose Embedding and Estimation
We present a new scheme to robustly detect a type of human attentive behavior, which we call frequent change in focus of attention (FCFA), from video sequences. FCFA behavior can b...
Nan Hu, Weimin Huang, Surendra Ranganath
ATAL
2005
Springer
15 years 3 months ago
Formation of cooperation structure by interaction network in directed multi-agent
A directed agent implies an agent with high constraints in both recognition and motion. Because of the embodied restrictions, the directed agent perceives a sense of subjective di...
Kosuke Sekiyama, Yukihisa Okade