Sciweavers

4511 search results - page 691 / 903
» Observation Based System Security
Sort
View
121
Voted
IJCV
2000
132views more  IJCV 2000»
15 years 3 months ago
2 1/2 D Visual Servoing with Respect to Unknown Objects Through a New Estimation Scheme of Camera Displacement
Classical visual servoing techniques need a strong a priori knowledge of the shape and the dimensions of the observed objects. In this paper, we present how the 2 1/2 D visual serv...
Ezio Malis, François Chaumette
130
Voted
TCAD
2010
90views more  TCAD 2010»
14 years 10 months ago
Fast, Nearly Optimal ISE Identification With I/O Serialization Through Maximal Clique Enumeration
The last decade has witnessed the emergence of the application-specific instruction-set processor (ASIP) as a viable platform for embedded systems. Extensible ASIPs allow the user ...
Ajay K. Verma, Philip Brisk, Paolo Ienne
139
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Gesture-based Dynamic Bayesian Network for noise robust speech recognition
Previously we have proposed different models for estimating articulatory gestures and vocal tract variable (TV) trajectories from synthetic speech. We have shown that when deploye...
Vikramjit Mitra, Hosung Nam, Carol Y. Espy-Wilson,...
120
Voted
IMC
2005
ACM
15 years 9 months ago
Exploiting Underlying Structure for Detailed Reconstruction of an Internet-scale Event
Network “telescopes” that record packets sent to unused blocks of Internet address space have emerged as an important tool for observing Internet-scale events such as the spre...
Abhishek Kumar, Vern Paxson, Nicholas Weaver
135
Voted
DCC
2001
IEEE
16 years 3 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler