Sciweavers

2279 search results - page 69 / 456
» Robust Circle Detection
Sort
View
BMVC
1997
15 years 1 months ago
Robust Recursive Structure and Motion Recovery under Affine Projection
In this paper we present an algorithm for structure and motion (SM) recovery under affine projection from video sequences. The algorithm tracks the motion of a single structure, b...
Miroslav Trajkovic, Mark Hedley
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
15 years 3 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
GECCO
2008
Springer
196views Optimization» more  GECCO 2008»
15 years 29 days ago
A fuzzy-genetic approach to network intrusion detection
Computer networks have expanded significantly in use and numbers. This expansion makes them more vulnerable to attack by malicious agents. Many current intrusion detection systems...
Terrence P. Fries
ICC
2000
IEEE
111views Communications» more  ICC 2000»
15 years 4 months ago
Detection of Linear Modulations in the Presence of Strong Phase and Frequency Instabilities
—Noncoherent sequence detection algorithms, recently proposed by the authors, have a performance which approaches that of coherent detectors and are robust to phase and frequency...
Giulio Colavolpe, Riccardo Raheli, Giorgio Picchi
CONEXT
2008
ACM
15 years 1 months ago
Packet-dropping adversary identification for data plane security
Until recently, the design of packet dropping adversary identification protocols that are robust to both benign packet loss and malicious behavior has proven to be surprisingly el...
Xin Zhang, Abhishek Jain 0002, Adrian Perrig