Sciweavers

176 search results - page 18 / 36
» Analyzing Depth from Coded Aperture Sets
Sort
View
IIHMSP
2006
IEEE
136views Multimedia» more  IIHMSP 2006»
15 years 10 months ago
Boosted String Representation and Its Application to Video Surveillance
This paper presents a new behavior classification system for analyzing human movements directly from video sequences. First of all, we propose a triangulation-based method to tran...
Yung-Tai Hsu, Jun-Wei Hsieh
ASIACRYPT
2000
Springer
15 years 8 months ago
Power Analysis, What Is Now Possible...
Since Power Analysis on smart-cards was introduced by Paul Kocher [KJJ98], the validity of the model used for smart-cards has not been given much attention. In this paper, we firs...
Mehdi-Laurent Akkar, Régis Bevan, Paul Disc...
MP
2006
73views more  MP 2006»
15 years 4 months ago
On the implementation of an interior-point filter line-search algorithm for large-scale nonlinear programming
We present a primal-dual interior-point algorithm with a filter line-search method for nonlinear programming. Local and global convergence properties of this method were analyzed i...
Andreas Wächter, Lorenz T. Biegler
TACAS
2010
Springer
221views Algorithms» more  TACAS 2010»
15 years 11 months ago
Trace-Based Symbolic Analysis for Atomicity Violations
Abstract. We propose a symbolic algorithm to accurately predict atomicity violations by analyzing a concrete execution trace of a concurrent program. We use both the execution trac...
Chao Wang, Rhishikesh Limaye, Malay K. Ganai, Aart...
CN
2011
140views more  CN 2011»
14 years 8 months ago
Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures
Nowadays, data storage requirements from end-users are growing, demanding more capacity, more reliability and the capability to access information from anywhere. Cloud storage ser...
Lluis Pamies-Juarez, Pedro García Ló...