Sciweavers

5948 search results - page 24 / 1190
» Computing Robust Counter-Strategies
Sort
View
WONS
2012
IEEE
13 years 5 months ago
Can P2P swarm loading improve the robustness of 6LoWPAN data transfer?
—The recent arrival of 6LoWPAN, an IPv6 variant for low-power wireless devices, allows for the development of IPbased applications for low-power wireless networks like sensor net...
Marcel Bosling, Torsten Redmann, Jean Tekam, Elias...
CVPR
2012
IEEE
13 years 6 days ago
Multi-target tracking by online learning of non-linear motion patterns and robust appearance models
We describe an online approach to learn non-linear motion patterns and robust appearance models for multi-target tracking in a tracklet association framework. Unlike most previous...
Bo Yang, Ram Nevatia
CVPR
2012
IEEE
13 years 6 days ago
Robust camera self-calibration from monocular images of Manhattan worlds
We focus on the detection of orthogonal vanishing points using line segments extracted from a single view, and using these for camera self-calibration. Recent methods view this pr...
Horst Wildenauer, Allan Hanbury
INFORMATICALT
2000
99views more  INFORMATICALT 2000»
14 years 9 months ago
Closed-loop Robust Identification Using the Direct Approach
Abstract. The aim of the given paper is a development of the direct approach used for the estimation of parameters of a closed-loop discrete-time dynamic system in the case of addi...
Rimantas Pupeikis
ICPR
2010
IEEE
14 years 8 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan