Sciweavers

10890 search results - page 41 / 2178
» Automatic Complexity Analysis
Sort
View
IJCV
2010
574views more  IJCV 2010»
13 years 6 months ago
Time-Delayed Correlation Analysis for Multi-Camera Activity Understanding
We propose a novel approach to understanding activities from their partial observations monitored through multiple non-overlapping cameras separated by unknown time gaps. In our...
Chen Change Loy, Tao Xiang, Shaogang Gong
IANDC
2007
151views more  IANDC 2007»
13 years 7 months ago
Transducer-based analysis of cryptographic protocols
Cryptographic protocols can be divided into (1) protocols where the protocol steps are simple from a computational point of view and can thus be modeled by simple means, for insta...
Ralf Küsters, Thomas Wilke
INFORMATICALT
2007
76views more  INFORMATICALT 2007»
13 years 7 months ago
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker
A modified version of the Bellare and Rogaway (1993) adversarial model is encoded using Asynchronous Product Automata (APA). A model checker tool, Simple Homomorphism Verificatio...
Kim-Kwang Raymond Choo
ICMCS
1999
IEEE
202views Multimedia» more  ICMCS 1999»
13 years 12 months ago
Face Detection in Color Images Using Wavelet Packet Analysis
In this paper, we propose a novel scheme for automatic and fast detection of human faces in color images where the number, the location, the orientation and the size of the faces ...
Christophe Garcia, G. Zikos, George Tziritas
CSMR
2009
IEEE
14 years 2 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis