Sciweavers

5948 search results - page 24 / 1190
» Computing Robust Counter-Strategies
Sort
View
WONS
2012
IEEE
13 years 7 months ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
CVPR
2012
IEEE
13 years 2 months ago
Multi-target tracking by online learning of non-linear motion patterns and robust appearance models
We describe an online approach to learn non-linear motion patterns and robust appearance models for multi-target tracking in a tracklet association framework. Unlike most previous...
Bo Yang, Ram Nevatia
CVPR
2012
IEEE
13 years 2 months ago
Robust camera self-calibration from monocular images of Manhattan worlds
We focus on the detection of orthogonal vanishing points using line segments extracted from a single view, and using these for camera self-calibration. Recent methods view this pr...
Horst Wildenauer, Allan Hanbury
INFORMATICALT
2000
99views more  INFORMATICALT 2000»
14 years 11 months ago
Closed-loop Robust Identification Using the Direct Approach
Abstract. The aim of the given paper is a development of the direct approach used for the estimation of parameters of a closed-loop discrete-time dynamic system in the case of addi...
Rimantas Pupeikis
ICPR
2010
IEEE
14 years 10 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan