Sciweavers

1116 search results - page 142 / 224
» Key Agreement Using Statically Keyed Authenticators
Sort
View
CVIU
2006
256views more  CVIU 2006»
13 years 7 months ago
Human body pose detection using Bayesian spatio-temporal templates
We present a template-based approach to detecting human silhouettes in a specific walking pose. Our templates consist of short sequences of 2D silhouettes obtained from motion cap...
Miodrag Dimitrijevic, Vincent Lepetit, Pascal Fua
PKC
2009
Springer
116views Cryptology» more  PKC 2009»
14 years 8 months ago
Improving the Boneh-Franklin Traitor Tracing Scheme
Abstract. Traitor tracing schemes are cryptographically secure broadcast methods that allow identification of conspirators: if a pirate key is generated by k traitors out of a stat...
Pascal Junod, Alexandre Karlov, Arjen K. Lenstra
IVC
2010
95views more  IVC 2010»
13 years 6 months ago
Monocular head pose estimation using generalized adaptive view-based appearance model
Accurately estimating the person’s head position and orientation is an important task for a wide range of applications such as driver awareness, meeting analysis and human-robot...
Louis-Philippe Morency, Jacob Whitehill, Javier R....
DAC
1999
ACM
14 years 8 months ago
Synthesis of Embedded Software Using Free-Choice Petri Nets
Software synthesis from a concurrent functional specification is a key problem in the design of embedded systems. A concurrent specification is well-suited for medium-grained part...
Marco Sgroi, Luciano Lavagno
WSCG
2004
142views more  WSCG 2004»
13 years 9 months ago
Collision Detection Using Polar Diagrams
In Computer Graphics, Collision Detection is considered a key problem with important applications in related areas. Several solutions have been proposed, but independently of the ...
Lidia M. Ortega, Francisco R. Feito, Clara I. Grim...