Sciweavers

988 search results - page 196 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
VC
2002
215views more  VC 2002»
13 years 7 months ago
Acquiring, stitching and blending diffuse appearance attributes on 3D models
A new system for the construction of highly realistic models of real free-form 3D objects is proposed, based on the integration of several techniques (automatic 3D scanning, inver...
Claudio Rocchini, Paolo Cignoni, Claudio Montani, ...
PAMI
2008
235views more  PAMI 2008»
13 years 7 months ago
Dependent Multiple Cue Integration for Robust Tracking
We propose a new technique for fusing multiple cues to robustly segment an object from its background in video sequences that suffer from abrupt changes of both illumination and po...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...
SIGOPS
2010
162views more  SIGOPS 2010»
13 years 6 months ago
Visual and algorithmic tooling for system trace analysis: a case study
Despite advances in the application of automated statistical and machine learning techniques to system log and trace data there will always be a need for human analysis of machine...
Wim De Pauw, Steve Heisig
BIBM
2010
IEEE
156views Bioinformatics» more  BIBM 2010»
13 years 5 months ago
Truncation of protein sequences for fast profile alignment with application to subcellular localization
We have recently found that the computation time of homology-based subcellular localization can be substantially reduced by aligning profiles up to the cleavage site positions of s...
Man-Wai Mak, Wei Wang, Sun-Yuan Kung
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 5 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...