Sciweavers

1575 search results - page 155 / 315
» Simultaneous Source Location
Sort
View
156
Voted
JDCTA
2010
139views more  JDCTA 2010»
14 years 10 months ago
Tracing Anonymous Mobile Attackers in Wireless Network
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...
Ming Hour Yang, Shiuhpyng Shieh
ICCV
2001
IEEE
16 years 5 months ago
Shadow Carving
The shape of an object may be estimated by observing the shadows on its surface. We present a method that is robust with respect to a conservative classification of shadow regions...
Silvio Savarese, Holly E. Rushmeier, Fausto Bernar...
124
Voted
ICIP
2003
IEEE
16 years 5 months ago
Removal of video line jitter using a dynamic programming approach
Analog video digitized from noisy sources can suffer of line registration problems due to bad synchronization pulses. The effect is that the image lines are randomly shiftedwith r...
Louis Laborelli
132
Voted
ICML
2000
IEEE
16 years 4 months ago
Meta-Learning by Landmarking Various Learning Algorithms
Landmarking is a novel approach to describing tasks in meta-learning. Previous approaches to meta-learning mostly considered only statistics-inspired measures of the data as a sou...
Bernhard Pfahringer, Hilan Bensusan, Christophe G....
109
Voted
SIGMOD
2004
ACM
120views Database» more  SIGMOD 2004»
16 years 3 months ago
Toward an ontology-enhanced information filtering agent
Whereas search engines assist users in locating initial information sources, often an overwhelmingly large number of ULRs is returned, and the task of browsing websites rests heavi...
Kwang Mong Sim