Sciweavers

1032 search results - page 48 / 207
» A Category of Explicit Fusions
Sort
View
USS
2008
13 years 10 months ago
Panic Passwords: Authenticating under Duress
Panic passwords allow a user to signal duress during authentication. We show that the well-known model of giving a user two passwords, a `regular' and a `panic' password...
Jeremy Clark, Urs Hengartner
CHIMIT
2008
ACM
13 years 9 months ago
Policy-based IT automation: the role of human judgment
Policy-based automation is emerging as a viable approach to IT systems management, codifying high-level business goals into executable specifications for governing IT operations. ...
Eser Kandogan, John H. Bailey, Paul P. Maglio, Ebe...
CVPR
2008
IEEE
14 years 9 months ago
Reconstructing non-stationary articulated objects in monocular video using silhouette information
This paper presents an approach to reconstruct nonstationary, articulated objects from silhouettes obtained with a monocular video sequence. We introduce the concept of motion blu...
Saad M. Khan, Mubarak Shah
PSIVT
2007
Springer
129views Multimedia» more  PSIVT 2007»
14 years 1 months ago
Multi-target Tracking with Poisson Processes Observations
This paper considers the problem of Bayesian inference in dynamical models with time-varying dimension. These models have been studied in the context of multiple target tracking pr...
Sergio Hernández, Paul Teal
CSL
2006
Springer
13 years 7 months ago
Support vector machines for speaker and language recognition
Support vector machines (SVMs) have proven to be a powerful technique for pattern classification. SVMs map inputs into a high dimensional space and then separate classes with a hy...
William M. Campbell, Joseph P. Campbell, Douglas A...