Sciweavers

1663 search results - page 292 / 333
» Computer Security in the Real World
Sort
View
130
Voted
CORR
2010
Springer
82views Education» more  CORR 2010»
15 years 3 months ago
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups
Secret sharing in user hierarchy represents a challenging area for research. Although a lot of work has already been done in this direction, this paper presents a novel approach t...
Ruchira Naskar, Indranil Sengupta
146
Voted
JMM2
2007
122views more  JMM2 2007»
15 years 3 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
143
Voted
ICCV
2009
IEEE
16 years 8 months ago
Static Multi-Camera Factorization Using Rigid Motion
Camera networks have gained increased importance in recent years. Previous approaches mostly used point correspondences between different camera views to calibrate such systems....
Roland Angst, Marc Pollefeys
122
Voted
CVPR
2008
IEEE
16 years 5 months ago
Matching images under unstable segmentations
Region based features are getting popular due to their higher descriptive power relative to other features. However, real world images exhibit changes in image segments capturing ...
Varsha Hedau, Himanshu Arora, Narendra Ahuja
143
Voted
VIS
2007
IEEE
157views Visualization» more  VIS 2007»
16 years 5 months ago
Surface Extraction from Multi-Material Components for Metrology using Dual Energy CT
Abstract-- This paper describes a novel method for creating surface models of multi-material components using dual energy computed tomography (DECT). The application scenario is me...
Christoph Heinzl, Johann Kastner, Eduard Grölle...