Sciweavers

644 search results - page 114 / 129
» A Proposal for the Implementation of a Parallel Watershed Al...
Sort
View
CVPR
2007
IEEE
14 years 10 months ago
Leveraging temporal, contextual and ordering constraints for recognizing complex activities in video
We present a scalable approach to recognizing and describing complex activities in video sequences. We are interested in long-term, sequential activities that may have several par...
Benjamin Laxton, Jongwoo Lim, David J. Kriegman
ECCV
2008
Springer
14 years 10 months ago
Learning Two-View Stereo Matching
We propose a graph-based semi-supervised symmetric matching framework that performs dense matching between two uncalibrated wide-baseline images by exploiting the results of sparse...
Jianxiong Xiao, Jingni Chen, Dit-Yan Yeung, Long Q...
ICDCSW
2007
IEEE
14 years 2 months ago
Event Stream Processing with Out-of-Order Data Arrival
Complex event processing has become increasingly important in modern applications, ranging from supply chain management for RFID tracking to real-time intrusion detection. The goa...
Ming Li, Mo Liu, Luping Ding, Elke A. Rundensteine...
ICDCSW
2007
IEEE
14 years 2 months ago
A Multi-dimensional Reputation System Combined with Trust and Incentive Mechanisms in P2P File Sharing Systems
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works have always used incentive mechanisms and trust mechanisms to address them resp...
Mao Yang, Qinyuan Feng, Yafei Dai, Zheng Zhang
CHES
2007
Springer
157views Cryptology» more  CHES 2007»
14 years 2 months ago
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
Abstract. A5/2 is a synchronous stream cipher that is used for protecting GSM communication. Recently, some powerful attacks [2,10] on A5/2 have been proposed. In this contribution...
Andrey Bogdanov, Thomas Eisenbarth, Andy Rupp