Sciweavers

3134 search results - page 21 / 627
» Computing full disjunctions
Sort
View
ACSAC
2010
IEEE
13 years 7 months ago
Keeping data secret under full compromise using porter devices
We address the problem of confidentiality in scenarios where the attacker is not only able to observe the communication between principals, but can also fully compromise the commu...
Christina Pöpper, David A. Basin, Srdjan Capk...
IRI
2006
IEEE
14 years 3 months ago
Replacing full rectangles by dense rectangles: Concept lattices and attribute implications
— Maximal full rectangles in tabular data are useful in several areas of data engineering. This paper presents a survey of results in which we replace “full rectangles” by ...
Radim Belohlávek, Vilém Vychodil
CVPR
2005
IEEE
14 years 12 months ago
Full Body Tracking from Multiple Views Using Stochastic Sampling
We present a novel approach for full body pose tracking using stochastic sampling. A volumetric reconstruction of a person is extracted from silhouettes in multiple video images. ...
Roland Kehl, Matthieu Bray, Luc J. Van Gool
ICPR
2008
IEEE
14 years 4 months ago
Full body tracking-based human action recognition
In this paper, we present a novel method for human action recognition with the combined global movement feature and local configuration feature. The human action is represented as...
Junxia Gu, Xiaoqing Ding, Shengjin Wang, Youshou W...
CHI
1995
ACM
14 years 1 months ago
TileBars: Visualization of Term Distribution Information in Full Text Information Access
The field of information retrieval has traditionallyfocused on s consistingof titlesand abstracts. As a consequence, many underlying assumptions must be altered for retrieval fro...
Marti A. Hearst