Sciweavers

4693 search results - page 798 / 939
» Verifying Hybrid Systems
Sort
View
95
Voted
COMPSAC
2008
IEEE
15 years 7 months ago
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats
This work introduces probabilistic model checking as a viable tool-assisted approach for systematically quantifying DoS security threats. The proposed analysis is based on a proba...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
CRV
2008
IEEE
192views Robotics» more  CRV 2008»
15 years 7 months ago
Realtime Visualization of Monocular Data for 3D Reconstruction
Methods for reconstructing photorealistic 3D graphics models from images or video are appealing applications of computer vision. Such methods rely on good input image data, but th...
Adam Rachmielowski, Neil Birkbeck, Martin Jäg...
114
Voted
CVPR
2008
IEEE
15 years 7 months ago
3D face tracking and expression inference from a 2D sequence using manifold learning
We propose a person-dependent, manifold-based approach for modeling and tracking rigid and nonrigid 3D facial deformations from a monocular video sequence. The rigid and nonrigid ...
Wei-Kai Liao, Gérard G. Medioni
105
Voted
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 7 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
HOTI
2008
IEEE
15 years 7 months ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani