Sciweavers

979 search results - page 75 / 196
» Event Detection in Pedestrian Detection and Tracking Applica...
Sort
View
PAM
2011
Springer
14 years 19 days ago
FACT: Flow-Based Approach for Connectivity Tracking
More than 20 years after the launch of the public Internet, operator forums are still full of reports about temporary unreachability of complete networks. We propose FACT, a system...
Dominik Schatzmann, Simon Leinen, Jochen Köge...
GI
2009
Springer
14 years 7 months ago
Low Frequency Towed Active Sonar (LFTAS) in Multistatic Applications
: The performance potential of multistatic sonar operations has been investigated by several research institutes and proven in numerous international sea trials during the last yea...
Stephan Benen
ACSAC
2004
IEEE
15 years 1 months ago
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances
We map intrusion events to known exploits in the network attack graph, and correlate the events through the corresponding attack graph distances. From this, we construct attack sc...
Steven Noel, Eric Robertson, Sushil Jajodia
FGCN
2008
IEEE
200views Communications» more  FGCN 2008»
15 years 4 months ago
Fast Method for Multiple Human Face Segmentation in Color Image
Face segmentation has been used in many different applications, such as face tracking, video surveillance in security control system and human computer interface. In this paper we...
Rudy Adipranata, Eddy, Cherry G. Ballangan, Ronald...
FGR
2006
IEEE
112views Biometrics» more  FGR 2006»
15 years 3 months ago
Self Correcting Tracking for Articulated Objects
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...
M. Baris Caglar, Niels da Vitoria Lobo