Sciweavers

2486 search results - page 475 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
CVIU
2007
121views more  CVIU 2007»
13 years 8 months ago
Vision-based hand pose estimation: A review
Direct use of the hand as an input device is an attractive method for providing natural human–computer interaction (HCI). Currently, the only technology that satisfies the adva...
Ali Erol, George Bebis, Mircea Nicolescu, Richard ...
EWC
2010
91views more  EWC 2010»
13 years 7 months ago
Multiobjective global surrogate modeling, dealing with the 5-percent problem
When dealing with computationally expensive simulation codes or process measurement data, surrogate modeling methods are firmly established as facilitators for design space explor...
Dirk Gorissen, Ivo Couckuyt, Eric Laermans, Tom Dh...
PAM
2010
Springer
14 years 3 months ago
Network DVR: A Programmable Framework for Application-Aware Trace Collection
Network traces are essential for a wide range of network applications, including traffic analysis, network measurement, performance monitoring, and security analysis. Existing cap...
Chia-Wei Chang, Alexandre Gerber, Bill Lin, Subhab...
CRYPTO
2000
Springer
151views Cryptology» more  CRYPTO 2000»
14 years 1 months ago
New Public-Key Cryptosystem Using Braid Groups
Abstract. The braid groups are infinite non-commutative groups naturally arising from geometric braids. The aim of this article is twofold. One is to show that the braid groups ca...
Ki Hyoung Ko, Sangjin Lee, Jung Hee Cheon, Jae Woo...
CVPR
2004
IEEE
14 years 10 months ago
Bayesian Assembly of 3D Axially Symmetric Shapes from Fragments
We present a complete system for the purpose of automatically assembling 3D pots given 3D measurements of their fragments commonly called sherds. A Bayesian approach is formulated...
Andrew R. Willis, David B. Cooper