Sciweavers

77 search results - page 13 / 16
» AS Path Inference by Exploiting Known AS Paths
Sort
View
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
RECOMB
2007
Springer
15 years 9 months ago
QNet: A Tool for Querying Protein Interaction Networks
Molecular interaction databases can be used to study the evolution of molecular pathways across species. Querying such pathways is a challenging computational problem, and recent e...
Banu Dost, Tomer Shlomi, Nitin Gupta 0002, Eytan R...
IROS
2007
IEEE
171views Robotics» more  IROS 2007»
15 years 3 months ago
Learning full-body motions from monocular vision: dynamic imitation in a humanoid robot
— In an effort to ease the burden of programming motor commands for humanoid robots, a computer vision technique is developed for converting a monocular video sequence of human p...
Jeffrey B. Cole, David B. Grimes, Rajesh P. N. Rao
AAAI
1996
14 years 10 months ago
Robot Navigation Using Image Sequences
We describe a framework for robot navigation that exploits the continuity of image sequences. Tracked visual features both guide the robot and provide predictive information about...
Christopher Rasmussen, Gregory D. Hager
ECCV
2010
Springer
14 years 6 months ago
An Efficient Graph Cut Algorithm for Computer Vision Problems
Abstract. Graph cuts has emerged as a preferred method to solve a class of energy minimization problems in computer vision. It has been shown that graph cut algorithms designed kee...
Chetan Arora, Subhashis Banerjee, Prem Kalra, S. N...