Sciweavers

5384 search results - page 1076 / 1077
» Open Standards Requirements
Sort
View
CVPR
2012
IEEE
11 years 9 months ago
On SIFTs and their scales
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: mat...
Tal Hassner, Viki Mayzels, Lihi Zelnik-Manor
CVPR
2012
IEEE
11 years 9 months ago
Geodesic flow kernel for unsupervised domain adaptation
In real-world applications of visual recognition, many factors—such as pose, illumination, or image quality—can cause a significant mismatch between the source domain on whic...
Boqing Gong, Yuan Shi, Fei Sha, Kristen Grauman
ICDCS
2012
IEEE
11 years 9 months ago
G-COPSS: A Content Centric Communication Infrastructure for Gaming Applications
—With users increasingly focused on an online world, an emerging challenge for the network infrastructure is the need to support Massively Multiplayer Online Role Playing Games (...
Jiachen Chen, Mayutan Arumaithurai, Xiaoming Fu, K...
ESORICS
2012
Springer
11 years 9 months ago
Dismantling iClass and iClass Elite
With more than 300 million cards sold, HID iClass is one of the most popular contactless smart cards on the market. It is widely used for access control, secure login and payment s...
Flavio D. Garcia, Gerhard de Koning Gans, Roel Ver...
ASIACRYPT
2003
Springer
14 years 17 days ago
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
We introduce a new cryptographic tool: multiset hash functions. Unlike standard hash functions which take strings as input, multiset hash functions operate on multisets (or sets). ...
Dwaine E. Clarke, Srinivas Devadas, Marten van Dij...
« Prev « First page 1076 / 1077 Last » Next »