Sciweavers

1494 search results - page 279 / 299
» Bottom-Up Shape Analysis
Sort
View
IFIP
2009
Springer
14 years 2 months ago
Trusted Multiplexing of Cryptographic Protocols
Abstract. We present an analysis that determines when it is possible to multiplex a pair of cryptographic protocols. We present a transformation that improves the coverage of this ...
Jay A. McCarthy, Shriram Krishnamurthi
CIVR
2007
Springer
128views Image Analysis» more  CIVR 2007»
14 years 1 months ago
3D-Model search engine from photos
In this paper, we present the FOX-MIIRE 3D-Model Search Engine. Our search engine is based on Adaptive Views Vlustering (AVC) algorithm [4]. The AVC method uses statistical model ...
Tarik Filali Ansary, Jean-Philippe Vandeborre, Moh...
MIR
2005
ACM
137views Multimedia» more  MIR 2005»
14 years 1 months ago
A content-based image retrieval system for fish taxonomy
It is estimated that less than ten percent of the world’s species have been discovered and described. The main reason for the slow pace of new species description is that the sc...
Yixin Chen, Henry L. Bart Jr., Fei Teng
ICMI
2005
Springer
215views Biometrics» more  ICMI 2005»
14 years 1 months ago
Multimodal multispeaker probabilistic tracking in meetings
Tracking speakers in multiparty conversations constitutes a fundamental task for automatic meeting analysis. In this paper, we present a probabilistic approach to jointly track th...
Daniel Gatica-Perez, Guillaume Lathoud, Jean-Marc ...
HICSS
1995
IEEE
128views Biometrics» more  HICSS 1995»
13 years 11 months ago
Instruction Level Parallelism
Abstract. We reexamine the limits of parallelism available in programs, using runtime reconstruction of program data-flow graphs. While limits of parallelism have been examined in...