Sciweavers

1050 search results - page 119 / 210
» Two methods of authenticated positioning
Sort
View
SIAMAM
2008
93views more  SIAMAM 2008»
15 years 1 months ago
Mutually Exclusive Spiky Pattern and Segmentation Modeled by the Five-Component Meinhardt--Gierer System
We consider the five-component Meinhardt-Gierer model for mutually exclusive patterns and segmentation which was proposed in [11]. We prove rigorous results on the existence and st...
Juncheng Wei, Matthias Winter
JCS
1998
338views more  JCS 1998»
15 years 1 months ago
Intrusion Detection Using Sequences of System Calls
A method is introducted for detecting intrusions at the level of privileged processes. Evidence is given that short sequences of system calls executed by running processes are a g...
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaj...
ICPR
2010
IEEE
15 years 13 days ago
Matching Groups of People by Covariance Descriptor
In this paper, we present a new solution to the problem of matching groups of people across multiple nonoverlapping cameras. Similar to the problem of matching individuals across ...
Yinghao Cai, Valtteri Takala, Matti Pietikäin...
ICRA
2010
IEEE
139views Robotics» more  ICRA 2010»
15 years 13 days ago
Dynamic modelling and control of variable stiffness actuators
— After briefly summarizing the mechanical design of the two joint prototypes for the new DLR variable compliance arm, the paper exemplifies the dynamic modelling of one of the...
Alin Albu-Schäffer, Sebastian Wolf, Oliver Ei...
ICRA
2010
IEEE
112views Robotics» more  ICRA 2010»
15 years 13 days ago
Psychophysical evaluation of control scheme designed for optimal kinesthetic perception in scaled teleoperation
— This paper focuses on psychophysical evaluation of the control scheme developed to optimize the kinesthetic perception during the scaled teleoperation. The control problem is f...
Hyoung Il Son, T. Bhattacharjee, Hoeryong Jung, Do...