Sciweavers

1997 search results - page 72 / 400
» A Model for Data Leakage Detection
Sort
View
MMM
2007
Springer
123views Multimedia» more  MMM 2007»
15 years 6 months ago
Tamper Proofing 3D Motion Data Streams
This paper presents a fragile watermarking technique to tamper proof (Mocap) motion capture data. The technique visualizes 3D Mocap data as a series of cluster of points. Watermark...
Parag Agarwal, Balakrishnan Prabhakaran
IROS
2009
IEEE
139views Robotics» more  IROS 2009»
15 years 6 months ago
Improving robot navigation in structured outdoor environments by identifying vegetation from laser data
— This paper addresses the problem of vegetation detection from laser measurements. The ability to detect vegetation is important for robots operating outdoors, since it enables ...
Kai M. Wurm, Rainer Kümmerle, Cyrill Stachnis...
TSMC
2002
134views more  TSMC 2002»
14 years 11 months ago
Incorporating soft computing techniques into a probabilistic intrusion detection system
There are a lot of industrial applications that can be solved competitively by hard computing, while still requiring the tolerance for imprecision and uncertainty that can be explo...
Sung-Bae Cho
BIOSURVEILLANCE
2008
Springer
15 years 1 months ago
A Temporal Extension of the Bayesian Aerosol Release Detector
Early detection of bio-terrorist attacks is an important problem in public health surveillance. In this paper, we focus on the detection and characterization of outdoor aerosol rel...
Xiaohui Kong, Garrick L. Wallstrom, William R. Hog...
ISBI
2007
IEEE
15 years 6 months ago
Lesion Detection in Noisy Mr Brain Images Using Constrained Gmm and Active Contours
This paper focuses on the detection and segmentation of multiple sclerosis (MS) lesions in magnetic resonance images. The proposed method performs healthy tissue segmentation usin...
Oren Freifeld, Hayit Greenspan, Jacob Goldberger