Sciweavers

1737 search results - page 174 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
16 years 5 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
ICIP
2005
IEEE
16 years 6 months ago
Visual tracking via efficient kernel discriminant subspace learning
Robustly tracking moving objects in video sequences is one of the key problems in computer vision. In this paper we introduce a computationally efficient nonlinear kernel learning...
Chunhua Shen, Anton van den Hengel, Michael J. Bro...
132
Voted
IJRR
2006
75views more  IJRR 2006»
15 years 5 months ago
Force Analysis of Connected Differential Mechanisms: Application to Grasping
In this paper, a methodology is proposed for the analysis of the force capabilities of connected differential mechanisms. These systems are the key elements used to extend the prin...
Lionel Birglen, Clément M. Gosselin
158
Voted
ICCV
2011
IEEE
14 years 5 months ago
Gaussian Process Regression Flow for Analysis of Motion Trajectories
Recognition of motions and activities of objects in videos requires effective representations for analysis and matching of motion trajectories. In this paper, we introduce a new r...
Kihwan Kim, Dongryeol Lee, Irfan Essa
256
Voted
ITCC
2005
IEEE
15 years 10 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch