Sciweavers

139 search results - page 16 / 28
» Wireless Intrusion Detection Using Tracking Verification
Sort
View
KES
2000
Springer
15 years 1 months ago
Multi-view face detection using support vector machines and eigenspace modelling
An approach to multi-view face detection based on head pose estimation is presented in this paper. Support Vector Regression is employed to solve the problem of pose estimation. T...
Yongmin Li, Shaogang Gong, Jamie Sherrah, Heather ...
SAC
2010
ACM
15 years 4 months ago
Coverage-hole trap model in target tracking using distributed relay-robot network
Target tracking is an important issue in wireless sensor network applications. In this paper, we design a Coverage-Hole Trap Model (CTM) based on a system that contains one moving...
Huawei Miao, Chia-Ching Ooi, Xiaowen Wu, Christian...
ASPLOS
2004
ACM
15 years 3 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
CVPR
2007
IEEE
15 years 12 months ago
Learning Features for Tracking
We treat tracking as a matching problem of detected keypoints between successive frames. The novelty of this paper is to learn classifier-based keypoint descriptions allowing to i...
Michael Grabner, Helmut Grabner, Horst Bischof
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao