Sciweavers

2874 search results - page 496 / 575
» Intrusion Detection: Systems and Models
Sort
View
ICASSP
2011
IEEE
14 years 3 months ago
Forensically inspired approaches to automatic speaker recognition
This paper presents ongoing research leveraging forensic methods for automatic speaker recognition. Some of the methods forensic scientists employ include identifying speaker dist...
Kyu J. Han, Mohamed Kamal Omar, Jason W. Pelecanos...
IWINAC
2011
Springer
14 years 2 months ago
Clustering of Trajectories in Video Surveillance Using Growing Neural Gas
Abstract. One of the more important issues in intelligent video surveillance systems is the ability to handle events from the motion of objects. Thus, the classification of the tr...
Javier Acevedo-Rodríguez, Saturnino Maldona...
SIGSOFT
2007
ACM
16 years 17 days ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
ISMAR
2006
IEEE
15 years 5 months ago
Online camera pose estimation in partially known and dynamic scenes
One of the key requirements of augmented reality systems is a robust real-time camera pose estimation. In this paper we present a robust approach, which does neither depend on of...
Gabriele Bleser, Harald Wuest, Didier Stricker
ATAL
2006
Springer
15 years 3 months ago
Accident or intention: that is the question (in the Noisy Iterated Prisoner's Dilemma)
This paper focuses on the Noisy Iterated Prisoner's Dilemma, a version of the Iterated Prisoner's Dilemma (IPD) in which there is a nonzero probability that a "coop...
Tsz-Chiu Au, Dana S. Nau