Sciweavers

3305 search results - page 217 / 661
» Models and Modeling Infrastructures for Global Computational...
Sort
View
131
Voted
TCC
2009
Springer
131views Cryptology» more  TCC 2009»
16 years 4 months ago
Secure Computability of Functions in the IT Setting with Dishonest Majority and Applications to Long-Term Security
It is well known that general secure function evaluation (SFE) with information-theoretical (IT) security is infeasible in presence of a corrupted majority in the standard model. ...
Robin Künzler, Jörn Müller-Quade, D...
173
Voted
SIGCSE
2010
ACM
181views Education» more  SIGCSE 2010»
15 years 3 months ago
Internationalization of computer science education
Internationalization of computer science education involves incorporating awareness, knowledge and skills of professional life in a global environment. Through an NSF CPATH grant1...
Sarah A. Douglas, Arthur M. Farley, Ginnie Lo, And...
ICPR
2006
IEEE
16 years 4 months ago
Discriminative Descriptor-Based Observation Model for Visual Tracking
Varying illumination and partial occlusion are two main difficulties in visual tracking. Existing methods based on appearance information cannot solve these problems effectively s...
Chu-Song Chen, Wen-Yan Chang, Yi-Ping Hung
148
Voted
ICPR
2006
IEEE
16 years 4 months ago
Document Flattening through Grid Modeling and Regularization
For document images captured by a digital camera, perspective and geometric distortions make it hard to recognize the document content properly. In this paper, we propose an integ...
Chew Lim Tan, Shijian Lu
122
Voted
ICPR
2010
IEEE
15 years 10 months ago
Integrating a Discrete Motion Model into GMM Based Background Subtraction
GMM based algorithms have become the de facto standard for background subtraction in video sequences, mainly because of their ability to track multiple background distributions, w...
Christian Wolf, Jolion Jolion