Sciweavers

1050 search results - page 197 / 210
» A Trainable System for Object Detection
Sort
View
78
Voted
CN
2007
137views more  CN 2007»
14 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
ASE
2005
102views more  ASE 2005»
14 years 9 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
TWC
2008
194views more  TWC 2008»
14 years 9 months ago
Optimal Power Scheduling for Correlated Data Fusion in Wireless Sensor Networks via Constrained PSO
Optimal power scheduling for distributed detection in a Gaussian sensor network is addressed for both independent and correlated observations. We assume amplify-and-forward local p...
Thakshila Wimalajeewa, Sudharman K. Jayaweera
86
Voted
PAMI
2007
138views more  PAMI 2007»
14 years 9 months ago
A Fast Biologically Inspired Algorithm for Recurrent Motion Estimation
—We have previously developed a neurodynamical model of motion segregation in cortical visual area V1 and MT of the dorsal stream. The model explains how motion ambiguities cause...
Pierre Bayerl, Heiko Neumann
DEXA
2010
Springer
138views Database» more  DEXA 2010»
14 years 7 months ago
Enrichment of Raw Sensor Data to Enable High-Level Queries
Abstract. Sensor networks are increasingly used across various application domains. Their usage has the advantage of automated, often continuous, monitoring of activities and event...
Kenneth Conroy, Mark Roantree