Sciweavers

996 search results - page 184 / 200
» Component-based Face Detection
Sort
View
TIP
2008
142views more  TIP 2008»
13 years 10 months ago
Image Feature Localization by Multiple Hypothesis Testing of Gabor Features
Several novel and particularly successful object and object category detection and recognition methods based on image features, local descriptions of object appearance, have recent...
Jarmo Ilonen, Joni-Kristian Kamarainen, Pekka Paal...
CN
2004
108views more  CN 2004»
13 years 10 months ago
Smart dust, friend or foe?--Replacing identity with configuration trust
Smart dust motes are miniature self-contained systems that may be deployed in very large numbers. In military applications these devices are subject to different threats than conv...
Howard Chivers, John A. Clark
DEBU
1998
115views more  DEBU 1998»
13 years 10 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
MTA
2007
82views more  MTA 2007»
13 years 10 months ago
A scalable signature scheme for video authentication
This paper addresses the problem of ensuring the integrity of a digital video and presents a scalable signature scheme for video authentication based on cryptographic secret sharin...
Pradeep K. Atrey, Wei-Qi Yan, Mohan S. Kankanhalli
NETWORK
2007
100views more  NETWORK 2007»
13 years 10 months ago
Parallel Programmable Ethernet Controllers: Performance and Security
Programmable network interfaces can provide network servers with a flexible interface to high-bandwidth Ethernet links, but they face critical software and architectural challenge...
Derek L. Schuff, Vijay S. Pai, Paul Willmann, Scot...