Sciweavers

2988 search results - page 409 / 598
» Experiments with a New Boosting Algorithm
Sort
View
ISM
2008
IEEE
98views Multimedia» more  ISM 2008»
15 years 9 months ago
Protecting SIP Proxy Servers from Ringing-Based Denial-of-Service Attacks
As Internet telephony systems continue to replace existing Public Switched Telephone Network systems, proxy servers running the Session Initiation Protocol (SIP) will continue to ...
William Conner, Klara Nahrstedt
SSDBM
2008
IEEE
150views Database» more  SSDBM 2008»
15 years 9 months ago
Summarizing Two-Dimensional Data with Skyline-Based Statistical Descriptors
Much real data consists of more than one dimension, such as financial transactions (eg, price × volume) and IP network flows (eg, duration × numBytes), and capture relationship...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
BROADNETS
2007
IEEE
15 years 9 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang
IROS
2007
IEEE
138views Robotics» more  IROS 2007»
15 years 9 months ago
On-demand sharing of a high-resolution panorama video from networked robotic cameras
— Due to their flexibility in coverage and resolution, networked robotic cameras become more and more popular in applications such as natural observation, security surveillance,...
Ni Qin, Dezhen Song
WACV
2007
IEEE
15 years 9 months ago
Localization and Mapping for Autonomous Navigation in Outdoor Terrains : A Stereo Vision Approach
We consider the problem of autonomous navigation in unstructured outdoor terrains using vision sensors. The goal is for a robot to come into a new environment, map it and move to ...
Motilal Agrawal, Kurt Konolige, Robert C. Bolles