Sciweavers

17288 search results - page 3419 / 3458
» Hybrid Optimizations: Which Optimization Algorithm to Use
Sort
View
CCS
2011
ACM
12 years 8 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
CRYPTO
2012
Springer
234views Cryptology» more  CRYPTO 2012»
11 years 11 months ago
Homomorphic Evaluation of the AES Circuit
We describe a working implementation of leveled homomorphic encryption (without bootstrapping) that can evaluate the AES-128 circuit in three different ways. One variant takes und...
Craig Gentry, Shai Halevi, Nigel P. Smart
CVPR
2006
IEEE
14 years 10 months ago
A Closed Form Solution to Natural Image Matting
Interactive digital matting, the process of extracting a foreground object from an image based on limited user input, is an important task in image and video editing. From a compu...
Anat Levin, Dani Lischinski, Yair Weiss
ECCV
2008
Springer
14 years 10 months ago
Latent Pose Estimator for Continuous Action Recognition
Recently, models based on conditional random fields (CRF) have produced promising results on labeling sequential data in several scientific fields. However, in the vision task of c...
Huazhong Ning, Wei Xu, Yihong Gong, Thomas S. Huan...
ECCV
2002
Springer
14 years 10 months ago
Visual Data Fusion for Objects Localization by Active Vision
Visual sensors provide exclusively uncertain and partial knowledge of a scene. In this article, we present a suitable scene knowledge representation that makes integration and fusi...
François Chaumette, Grégory Flandin
« Prev « First page 3419 / 3458 Last » Next »