Sciweavers

5948 search results - page 904 / 1190
» Computing Robust Counter-Strategies
Sort
View
AINA
2007
IEEE
15 years 10 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
AINA
2007
IEEE
15 years 10 months ago
Speaker Tracking and Identifying Based on Indoor Localization System and Microphone Array
This paper presents a novel multimodal system to track the participants and identify the active speaker in the smart meeting room. Indoor localization system, Cicada, is used to o...
Xiaojie Chen, Yuanchun Shi, Wenfeng Jiang
AMFG
2007
IEEE
225views Biometrics» more  AMFG 2007»
15 years 10 months ago
Model-Based Stereo with Occlusions
This paper addresses the recovery of face models from stereo pairs of images in the presence of foreign-body occlusions. In the proposed approach, a 3D morphable model (3DMM) for f...
Fabiano Romeiro, Todd Zickler
BROADNETS
2007
IEEE
15 years 10 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
CVPR
2007
IEEE
15 years 10 months ago
Accurate Dynamic Sketching of Faces from Video
A sketch captures the most informative part of an object, in a much more concise and potentially robust representation (e.g., for face recognition or new capabilities of manipulat...
Zijian Xu, Jiebo Luo