Sciweavers

627 search results - page 122 / 126
» Face recognition using feature extraction based on independe...
Sort
View
TIP
2008
344views more  TIP 2008»
13 years 7 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
14 years 1 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
BIBM
2007
IEEE
139views Bioinformatics» more  BIBM 2007»
13 years 11 months ago
Automatic Identification of Temporal Sequences in Chewing Sounds
Chewing is an essential part of food intake. The analysis and detection of food patterns is an important component of an automatic dietary monitoring system. However chewing is a t...
Oliver Amft, Martin Kusserow, Gerhard Tröster
ICPR
2010
IEEE
13 years 11 months ago
PILL-ID: Matching and Retrieval of Drug Pill Imprint Images
—Automatic illicit drug pill matching and retrieval is becoming an important problem due to an increase in the number of tablet type illicit drugs being circulated in our society...
Young-Bum Lee, Unsang Park, Anil Jain
APSEC
2007
IEEE
14 years 1 months ago
Modeling and Learning Interaction-based Accidents for Safety-Critical Software Systems
Analyzing accidents is a vital exercise in the development of safety-critical software systems to prevent past accidents from reoccurring in the future. Current practices such as ...
Tariq Mahmood, Edmund Kazmierczak, Tim Kelly, Denn...