Sciweavers

2834 search results - page 142 / 567
» A Probabilistic Approach to Measuring Robustness in Computin...
Sort
View
PLDI
2009
ACM
14 years 4 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
ICIAR
2005
Springer
14 years 2 months ago
Real-Time and Robust Background Updating for Video Surveillance and Monitoring
Abstract. Background updating is an important aspect of dynamic scene analysis. Two critical problems: sudden camera perturbation and the sleeping person problem, which arise frequ...
Xingzhi Luo, Suchendra M. Bhandarkar
MICCAI
2000
Springer
14 years 23 days ago
Robust Midsagittal Plane Extraction from Coarse, Pathological 3D Images
Abstract. This paper focuses on the evaluation of an ideal midsagittal plane iMSP extraction algorithm. The algorithm was developed for capturing the iMSP from 3D normal and pathol...
Yanxi Liu, Robert T. Collins, William E. Rothfus
ICAPR
2005
Springer
14 years 2 months ago
Fingerprint Image Enhancement Using STFT Analysis
Contrary to popular belief, despite decades of research in fingerprints, reliable fingerprint recognition is an open problem. Extracting features out of poor quality prints is t...
Sharat Chikkerur, Venu Govindaraju, Alexander N. C...
CVPR
2000
IEEE
14 years 1 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...