Sciweavers

1663 search results - page 109 / 333
» Computer Security in the Real World
Sort
View
CVPR
2003
IEEE
16 years 5 months ago
Evaluation of Local Models of Dynamic Backgrounds
Background subtraction is the first step of many video surveillance applications. What is considered background varies by application, and may include regular, systematic, or comp...
Robert Pless, John Larson, Scott Siebers, Ben West...
121
Voted
CG
2006
Springer
15 years 3 months ago
Connectivity preserving digitization of blurred binary images in 2D and 3D
Connectivity and neighborhood are fundamental topological properties of objects in pictures. Since the input for any image analysis algorithm is a digital image, which does not ne...
Peer Stelldinger, Ullrich Köthe
234
Voted
UIST
2010
ACM
15 years 1 months ago
TwinSpace: an infrastructure for cross-reality team spaces
We introduce TwinSpace, a flexible software infrastructure for combining interactive workspaces and collaborative virtual worlds. Its design is grounded in the need to support dee...
Derek F. Reilly, Hafez Rouzati, Andy Wu, Jee Yeon ...
CCGRID
2006
IEEE
15 years 9 months ago
gSET: Trust Management and Secure Accounting for Business in the Grid
We developed gSET as solution for the unsolved problems in the field of dynamic trust management and secure accounting in commercial virtual organizations. gSET establishes trust...
Thomas Weishäupl, Christoph Witzany, Erich Sc...
SEDE
2007
15 years 4 months ago
AVRATAR: A virtual environment for puppet animation
When it comes to three dimensional computer animations, the use of live actors to control the movements of onscreen characters produces a realism that is unsurpassed. But so are t...
Alexander Redei, Ed Tumbusch, Josh Koberstein, Ser...