Sciweavers

988 search results - page 30 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
14 years 3 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
ICCV
2007
IEEE
14 years 10 months ago
Human Pose Estimation using Motion Exemplars
We present a motion exemplar approach for finding body configuration in monocular videos. A motion correlation technique is employed to measure the motion similarity at various sp...
Alireza Fathi, Greg Mori
ICMCS
2005
IEEE
177views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Comparison of Visual Features and Fusion Techniques in Automatic Detection of Concepts from News Video
This study describes experiments on automatic detection of semantic concepts, which are textual descriptions about the digital video content. The concepts can be further used in c...
Mika Rautiainen, Tapio Seppänen
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
14 years 9 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
CCS
2007
ACM
14 years 26 days ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...