Sciweavers

2994 search results - page 475 / 599
» Time sequences
Sort
View
DSN
2006
IEEE
15 years 6 months ago
Accurate and Automated System Call Policy-Based Intrusion Prevention
One way to prevent control hijacking attack is to compare a network application’s run-time system calls with a pre-defined normal system call behavior model, and raise an alert...
Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
114
Voted
FGR
2006
IEEE
112views Biometrics» more  FGR 2006»
15 years 6 months ago
Self Correcting Tracking for Articulated Objects
Hand detection and tracking play important roles in human computer interaction (HCI) applications, as well as surveillance. We propose a self initializing and self correcting trac...
M. Baris Caglar, Niels da Vitoria Lobo
93
Voted
ICRA
2006
IEEE
159views Robotics» more  ICRA 2006»
15 years 6 months ago
A Visual Compass based on SLAM
— Accurate full 3 axis orientation is computed using a low cost calibrated camera. We present a simultaneous sensor location and mapping method that uses a purely rotating camera...
J. M. M. Montiel, Andrew J. Davison
94
Voted
IJCNN
2006
IEEE
15 years 6 months ago
Markov Coding Strategy of the Simple Spiking Model of Auditory Neuron
— The present paper is devoted to the exploration of the properties of the simple spiking neuron model and quantification of the information transfer rate, which the separate neu...
Alexei V. Ivanov, Alexander A. Petrovsky
105
Voted
INFOCOM
2006
IEEE
15 years 6 months ago
Controlled Flooding Search with Delay Constraints
— In this paper we consider the problem of query and search in a network, e.g., searching for a specific node or a piece of data. We limit our attention to the class of TTL (tim...
Nicholas B. Chang, Mingyan Liu