Sciweavers

2503 search results - page 383 / 501
» Building Computer Network Attacks
Sort
View
131
Voted
CVPR
2009
IEEE
15 years 3 months ago
VideoTrek: A vision system for a tag-along robot
We present a system that combines multiple visual navigation techniques to achieve GPS-denied, non-line-of-sight SLAM capability for heterogeneous platforms. Our approach builds o...
Oleg Naroditsky, Zhiwei Zhu, Aveek Das, Supun Sama...
ICDCSW
2005
IEEE
15 years 8 months ago
Policy-Controlled Event Management for Distributed Intrusion Detection
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
Christian Kreibich, Robin Sommer
131
Voted
ICDCS
2000
IEEE
15 years 7 months ago
Partitionable Light-Weight Groups
Group communication, providing virtual synchrony semantics, is a powerful paradigm for building distributed applications. For applications that require a large number of groups, s...
Luís Rodrigues, Katherine Guo
CVPR
2009
IEEE
16 years 9 months ago
Stereo Matching with Nonparametric Smoothness Priors in Feature Space
We propose a novel formulation of stereo matching that considers each pixel as a feature vector. Under this view, matching two or more images can be cast as matching point clouds i...
Brandon M. Smith, Hailin Jin, Li Zhang
120
Voted
MICCAI
2003
Springer
16 years 3 months ago
Vascular Atlas Formation Using a Vessel-to-Image Affine Registration Method
We have developed a method for forming vascular atlases using vascular distance maps and a novel vascular model-to-image registration method. Our atlas formation process begins wit...
Dini Chillet, Julien Jomier, Derek Cool, Stephen R...