Sciweavers

8177 search results - page 405 / 1636
» Detecting System Emulators
Sort
View
144
Voted
TSP
2010
14 years 10 months ago
Improved interference cancellation scheme for two-user detection of alamouti code
In this paper, we propose an improved interference cancellation method for two-user multiple access based MIMO communication system. It is shown in the paper, that by using the pr...
Manav R. Bhatnagar, Are Hjørungnes
158
Voted
CLEF
2011
Springer
14 years 3 months ago
Detecting Wikipedia Vandalism using Machine Learning - Notebook for PAN at CLEF 2011
Wikipedia vandalism identification is a very complex issue, which is now mostly solved manually by volunteers. This paper presents the main components of a system built by our grou...
Cristian-Alexandru Dragusanu, Marina Cufliuc, Adri...
CVPR
2007
IEEE
16 years 6 months ago
Image representations beyond histograms of gradients: The role of Gestalt descriptors
Histograms of orientations and the statistics derived from them have proven to be effective image representations for various recognition tasks. In this work we attempt to improve...
Stanley M. Bileschi, Lior Wolf
ITRUST
2005
Springer
15 years 9 months ago
Risk Models for Trust-Based Access Control(TBAC)
The importance of risk in trust-based systems is well established. This paper presents a novel model of risk and decision-making based on economic theory. Use of the model is illus...
Nathan Dimmock, Jean Bacon, David Ingram, Ken Mood...
148
Voted
ICARCV
2002
IEEE
132views Robotics» more  ICARCV 2002»
15 years 9 months ago
Handling of randomly located moving parts using FPGA-based realtime vision
We will develop a manipulator system that can handle randomly located, moving parts. Vision algorithm to detect the planar motion of a part is implemented on an FPGA-based realtim...
Shinichi Hirai, Tatsuhiko Tsuboi, Masakazu Zakouji...