Sciweavers

498 search results - page 94 / 100
» Layered Active Appearance Models
Sort
View
ISW
2004
Springer
14 years 23 days ago
Low-Level Ideal Signatures and General Integrity Idealization
Abstract. Recently we showed how to justify a Dolev-Yao type model of cryptography as used in virtually all automated protocol provers under active attacks and in arbitrary protoco...
Michael Backes, Birgit Pfitzmann, Michael Waidner
CIKM
1994
Springer
13 years 11 months ago
Analytical Version Control Management in a Hypertext System
may be saved for later reuse of material, but also to preserve the historical perspective of work done [ha:92]. In particular, in distributed and collaborative hypertext systems, v...
Antonina Dattolo, Antonio Gisolfi
EKAW
1992
Springer
13 years 11 months ago
eQuality: An Application of DDucks to Process Management
Process management is a method for improving Boeing's business processes, however many aspects have been difficult to implement. eQuality is a software system based on a frame...
Jeffrey Bradshaw, Peter Holm, Oscar Kipersztok, Th...
CVPR
2006
IEEE
14 years 1 months ago
Joint Recognition of Complex Events and Track Matching
We present a novel method for jointly performing recognition of complex events and linking fragmented tracks into coherent, long-duration tracks. Many event recognition methods re...
Michael T. Chan, Anthony Hoogs, Rahul Bhotika, A. ...
IDMS
2001
Springer
142views Multimedia» more  IDMS 2001»
13 years 12 months ago
The Case for Streaming Multimedia with TCP
In this paper, we revisit and challenge the dogma that TCP is an undesirable choice for streaming multimedia, video in particular. For some time, the common view held that neither ...
Charles Krasic, Kang Li, Jonathan Walpole