Sciweavers

5234 search results - page 1005 / 1047
» Method Components - Rationale Revealed
Sort
View
WOWMOM
2006
ACM
110views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
Entrapping Adversaries for Source Protection in Sensor Networks
Sensor networks are used in a variety of application areas for diverse problems from habitat monitoring to military tracking. Whenever they are used to monitor sensitive objects, ...
Yi Ouyang, Zhengyi Le, Guanling Chen, James Ford, ...
ACSAC
2005
IEEE
15 years 9 months ago
Intrusion Detection in RBAC-administered Databases
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athen...
ICRA
2005
IEEE
122views Robotics» more  ICRA 2005»
15 years 8 months ago
Robust Adaptive Control of Automatic Guidance of Farm Vehicles in the Presence of Sliding
— High-precision autofarming is rapidly becoming a reality with the requirements of agricultural applications. Lots of research works have been focused on the automatic guidance ...
Hao Fang, Roland Lenain, Benoit Thuilot, Philippe ...
SMI
2005
IEEE
15 years 8 months ago
Subdomain Aware Contour Trees and Contour Evolution in Time-Dependent Scalar Fields
For time-dependent scalar fields, one is often interested in topology changes of contours in time. In this paper, we focus on describing how contours split and merge over a certa...
Andrzej Szymczak
MIR
2005
ACM
198views Multimedia» more  MIR 2005»
15 years 8 months ago
Semi-automatic video annotation based on active learning with multiple complementary predictors
In this paper, we will propose a novel semi-automatic annotation scheme for video semantic classification. It is well known that the large gap between high-level semantics and low...
Yan Song, Xian-Sheng Hua, Li-Rong Dai, Meng Wang
« Prev « First page 1005 / 1047 Last » Next »