Sciweavers

546 search results - page 57 / 110
» Using and Detecting Links in Wikipedia
Sort
View
ICCV
2007
IEEE
16 years 2 months ago
Finding a Closed Boundary by Growing Minimal Paths from a Single Point on 2D or 3D Images
In this paper, we present a new method for segmenting closed contours and surfaces. Our work builds on a variant of the Fast Marching algorithm. First, an initial point on the des...
Fethallah Benmansour, Stephane Bonneau, Laurent D....
126
Voted
CRV
2004
IEEE
160views Robotics» more  CRV 2004»
15 years 4 months ago
A New Integrative Approach to Time Varying Image Interpretation
- This paper presents a global method to process monocular image sequences for mobile robot obstacle detection. We do not aim to achieve a complete scene reconstruction, but only t...
Philippe Guermeur
97
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
A Signal Processing View on Packet Sampling and Anomaly Detection
—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
Daniela Brauckhoff, Kavé Salamatian, Martin...
IPPS
2010
IEEE
14 years 10 months ago
Distributed monitoring of conditional entropy for anomaly detection in streams
In this work we consider the problem of monitoring information streams for anomalies in a scalable and efficient manner. We study the problem in the context of network streams wher...
Chrisil Arackaparambil, Sergey Bratus, Joshua Brod...
COMCOM
2007
149views more  COMCOM 2007»
15 years 2 days ago
Adaptive security design with malicious node detection in cluster-based sensor networks
Distributed wireless sensor networks have problems on detecting and preventing malicious nodes, which always bring destructive threats and compromise multiple sensor nodes. Theref...
Meng-Yen Hsieh, Yueh-Min Huang, Han-Chieh Chao