Sciweavers

2874 search results - page 492 / 575
» Intrusion Detection: Systems and Models
Sort
View
EUROSYS
2007
ACM
15 years 3 months ago
Discrete control for safe execution of IT automation workflows
As information technology (IT) administration becomes increasingly complex, workflow technologies are gaining popularity for IT automation. Writing correct workflow programs is no...
Yin Wang, Terence Kelly, Stéphane Lafortune
HCI
2007
15 years 1 months ago
Vision Based Laser Pointer Interaction for Flexible Screens
In recent years high quality interaction devices have become very popular in our environment. The industries are also currently undergoing rapid change and various technologies hav...
Nam Woo Kim, Seung Jae Lee, Byung-Gook Lee, Joon-J...
AAAI
1997
15 years 1 months ago
The "Inverse Hollywood Problem": From Video to Scripts and Storyboards via Causal Analysis
We address the problem of visually detecting causal events and tting them together into a coherent story of the action witnessed by the camera. We show that this can be done by re...
Matthew Brand
CORR
2008
Springer
89views Education» more  CORR 2008»
14 years 12 months ago
Idiotypic Immune Networks in Mobile Robot Control
Jerne's idiotypic-network theory postulates that the immune response involves interantibody stimulation and suppression, as well as matching to antigens. The theory has proved...
Amanda M. Whitbrook, Uwe Aickelin, Jonathan M. Gar...
AROBOTS
2002
166views more  AROBOTS 2002»
14 years 11 months ago
Multi-Modal Interaction of Human and Home Robot in the Context of Room Map Generation
In robotics, the idea of human and robot interaction is receiving a lot of attention lately. In this paper, we describe a multi-modal system for generating a map of the environment...
Saeed Shiry Ghidary, Yasushi Nakata, Hiroshi Saito...