Sciweavers

1424 search results - page 251 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
PRL
2006
95views more  PRL 2006»
15 years 1 months ago
Evolving visual sonar: Depth from monocular images
To recover depth from images, the human visual system uses many monocular depth cues, which vision research has only begun to explore. Because a given image can have many possible...
Martin C. Martin
ASE
2005
102views more  ASE 2005»
15 years 1 months ago
Modular Verification of Open Features Using Three-Valued Model Checking
Feature-oriented programming organizes programs around features rather than objects, thus better supporting extensible, product-line architectures. Programming languages increasin...
Harry C. Li, Shriram Krishnamurthi, Kathi Fisler
IGARSS
2010
14 years 11 months ago
Lidar education at Georgia Tech
The Georgia Tech Research Institute teamed with a local undergraduate women's institution, Agnes Scott College, to develop an eyesafe lidar for atmospheric remote sensing as ...
Gary Gimmestad, Leanne West
KDD
2012
ACM
178views Data Mining» more  KDD 2012»
13 years 3 months ago
Mining event periodicity from incomplete observations
Advanced technology in GPS and sensors enables us to track physical events, such as human movements and facility usage. Periodicity analysis from the recorded data is an important...
Zhenhui Li, Jingjing Wang, Jiawei Han
CONEXT
2009
ACM
15 years 2 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...