Sciweavers

1064 search results - page 172 / 213
» Tracking a Generator by Persistence
Sort
View
COMPSAC
2005
IEEE
15 years 3 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
CVPR
2005
IEEE
15 years 3 months ago
A Slit Scanning Depth of Route Panorama from Stationary Blur
This work achieves an efficient acquisition of scenes and their depths along streets. During the movement of a vehicle, a slit in the camera frame is set properly to sample scenes...
Min Shi, Jiang Yu Zheng
DSN
2005
IEEE
15 years 3 months ago
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks
Since sensor data gathering is the primary functionality of sensor networks, it is important to provide a fault tolerant method for reasoning about sensed events in the face of ar...
Mark D. Krasniewski, Padma Varadharajan, Bryan Rab...
ICCV
2005
IEEE
15 years 3 months ago
LOCUS: Learning Object Classes with Unsupervised Segmentation
We address the problem of learning object class models and object segmentations from unannotated images. We introduce LOCUS (Learning Object Classes with Unsupervised Segmentation...
John M. Winn, Nebojsa Jojic
ICRA
2005
IEEE
150views Robotics» more  ICRA 2005»
15 years 3 months ago
An Integrated Spatial Path-planning and Controller Design Approach for a Hover-mode Helicopter Model
— The objective of this paper is to design a controller based on a nonlinear hover-mode model for a helicopter, which can be seamlessly integrated in an existing spatial path-pla...
Kaustubh Pathak, Sunil Kumar Agrawal