Sciweavers

683 search results - page 44 / 137
» Vulnerability Analysis of High Dimensional Complex Systems
Sort
View
IVC
2000
179views more  IVC 2000»
15 years 11 days ago
A system to place observers on a polyhedral terrain in polynomial time
The Art Gallery Problem deals with determining the number of observers necessary to cover an art gallery room such that every point is seen by at least one observer. This problem ...
Maurício Marengoni, Bruce A. Draper, Allen ...
108
Voted
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 7 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
104
Voted
AVSS
2007
IEEE
15 years 7 months ago
Real-time detection of illegally parked vehicles using 1-D transformation
With decreasing costs of high quality surveillance systems, human activity detection and tracking has become increasingly practical. Accordingly, automated systems have been desig...
Jong Taek Lee, Michael S. Ryoo, Matthew Riley, Jak...
ECML
2006
Springer
15 years 4 months ago
Bayesian Active Learning for Sensitivity Analysis
Abstract. Designs of micro electro-mechanical devices need to be robust against fluctuations in mass production. Computer experiments with tens of parameters are used to explore th...
Tobias Pfingsten
107
Voted
PAMI
2007
196views more  PAMI 2007»
15 years 2 days ago
Bayesian Analysis of Lidar Signals with Multiple Returns
—Time-Correlated Single Photon Counting and Burst Illumination Laser data can be used for range profiling and target classification. In general, the problem is to analyze the res...
Sergio Hernandez-Marin, Andrew M. Wallace, Gavin J...