Sciweavers

740 search results - page 90 / 148
» Improving data quality through effective use of data semanti...
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis
We propose a method to verify the result of attacks detected by signature-based network intrusion detection systems using lightweight protocol analysis. The observation is that ne...
Jingmin Zhou, Adam J. Carlson, Matt Bishop
ICASSP
2010
IEEE
15 years 4 months ago
Search-Based Automatic Image Annotation via Flickr Photos Using Tag Expansion
Exponentially growing photo collections motivate the needs for automatic image annotation for effective manipulations (e.g., search, browsing). Most of the prior works rely on sup...
Liang-Chi Hsieh, Winston H. Hsu
ICRA
2010
IEEE
125views Robotics» more  ICRA 2010»
15 years 2 months ago
Robust Jacobian estimation for uncalibrated visual servoing
— This paper addresses robust estimation of the uncalibrated visual-motor Jacobian for an image-based visual servoing (IBVS) system. The proposed method does not require knowledg...
Azad Shademan, Amir Massoud Farahmand, Martin J&au...
IPMI
2005
Springer
15 years 10 months ago
PET Image Reconstruction: A Robust State Space Approach
Statistical iterative reconstruction algorithms have shown improved image quality over conventional nonstatistical methods in PET by using accurate system response models and measu...
Huafeng Liu, Yi Tian, Pengcheng Shi
INFOCOM
2005
IEEE
15 years 10 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao