Sciweavers

83 search results - page 10 / 17
» Image-Based Anomaly Detection Technique: Algorithm, Implemen...
Sort
View
ICRA
2006
IEEE
174views Robotics» more  ICRA 2006»
15 years 4 months ago
Multi-scale point and line range data algorithms for mapping and localization
— This paper presents a multi-scale point and line based representation of two-dimensional range scan data. The techniques are based on a multi-scale Hough transform and a tree r...
Samuel T. Pfister, Joel W. Burdick
OPODIS
2003
14 years 11 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
HCI
2007
14 years 11 months ago
A New Method for Multi-finger Detection Using a Regular Diffuser
In this paper, we developed a fingertip finding algorithm working with a regular diffuser. The proposed algorithm works on images captured by infra-red cameras, settled on one side...
Li-Wei Chan, Yi-Fan Chuang, Yi-Wei Chia, Yi-Ping H...
AVSS
2006
IEEE
15 years 4 months ago
Real-Time Detection of Camera Tampering
This paper presents a novel technique for camera tampering detection. It is implemented in real-time and was developed for use in surveillance and security applications. This meth...
Evan Ribnick, Stefan Atev, Osama Masoud, Nikolaos ...
WORM
2004
14 years 11 months ago
ACT: attachment chain tracing scheme for email virus detection and control
Modern society is highly dependent on the smooth and safe flow of information over communication and computer networks. Computer viruses and worms pose serious threats to the soci...
Jintao Xiong