Sciweavers

410 search results - page 33 / 82
» A micro-ethical view on computing practice
Sort
View
ASIACRYPT
2009
Springer
14 years 4 months ago
Security Bounds for the Design of Code-Based Cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to the classical number theory cryptography. Unlike many other such alternatives, it has th...
Matthieu Finiasz, Nicolas Sendrier
ICPR
2008
IEEE
14 years 4 months ago
Multivariate Laplace Filter: A heavy-tailed model for target tracking
Video-based target tracking is a challenging task, because there always appears to be complex occlusion among the varying number of objects. Also, in practice, it is very common t...
Daojing Wang, Chao Zhang, Xuemin Zhao
ACCV
2006
Springer
14 years 3 months ago
On Using Silhouettes for Camera Calibration
This paper addresses the problem of camera calibration using object silhouettes in image sequences. It is known that silhouettes encode information on camera parameters by the fact...
Edmond Boyer
ECCV
2004
Springer
14 years 3 months ago
Extrinsic Camera Parameter Recovery from Multiple Image Sequences Captured by an Omni-Directional Multi-camera System
Recently, many types of omni-directional cameras have been developed and attracted much attention in a number of different fields. Especially, the multi-camera type of omni-direc...
Tomokazu Sato, Sei Ikeda, Naokazu Yokoya
KR
2004
Springer
14 years 3 months ago
A Logic of Limited Belief for Reasoning with Disjunctive Information
The goal of producing a general purpose, semantically motivated, and computationally tractable deductive reasoning service remains surprisingly elusive. By and large, approaches t...
Yongmei Liu, Gerhard Lakemeyer, Hector J. Levesque