Sciweavers

12183 search results - page 141 / 2437
» Computers under Attacks!
Sort
View
JAIR
2011
214views more  JAIR 2011»
14 years 7 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
NDSS
2000
IEEE
15 years 9 months ago
A Lightweight Tool for Detecting Web Server Attacks
We present an intrusion-detection tool aimed at protecting web servers, and justify why such a tool is needed. We describe several interesting features, such as the ability to run...
Magnus Almgren, Hervé Debar, Marc Dacier
148
Voted
BMVC
2001
15 years 7 months ago
MDL based Structural Interpretation of Images under Partial Occlusion
In this paper an information theoretic approach is provided for resolving border ambiguity under partial occlusion. The proposed framework allows structural interpretation of imag...
Sowmya Ramakrishnan, Peter Forte
CVPR
2006
IEEE
16 years 7 months ago
A Multi-Channel Algorithm for Edge Detection Under Varying Lighting
In vision-based autonomous spacecraft docking multiple views of scene structure captured with the same camera and scene geometry is available under different lighting conditions. ...
Wei Xu, Michael Jenkin, Yves Lespérance
ICPR
2008
IEEE
16 years 6 months ago
Bilateral symmetry of object silhouettes under perspective projection
Symmetry is an important property of objects and is exhibited in different forms e.g., bilateral, rotational, etc. This paper presents an algorithm for computing the bilateral sym...
Cornelia Fermüller, Hyoungjune Yi, Konstantin...