Sciweavers

1512 search results - page 42 / 303
» Principles of IEEE 802.11s
Sort
View
CSFW
1998
IEEE
14 years 1 months ago
Honest Ideals on Strand Spaces
In security protocol analysis, it is important to learn general principles that limit the abilities of an attacker, and that can be applied repeatedly to a variety of protocols. W...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CVPR
1996
IEEE
14 years 27 days ago
Sparse Representations for Image Decomposition with Occlusions
We study the problem of how to detect \interesting objects" appeared in a given image, I. Our approach is to treat it as a function approximation problem based on an over-red...
Michael J. Donahue, Davi Geiger, Tyng-Luh Liu, Rob...
VL
1996
IEEE
14 years 27 days ago
Steering programs via time travel
Despite years of research into human computer interaction (HCI), the environments programmers must use for problem-solving today--with separate modes and tools for writing, compil...
John W. Atwood Jr., Margaret M. Burnett, Rebecca A...
ICCD
1992
IEEE
124views Hardware» more  ICCD 1992»
14 years 25 days ago
The ETCA Data-Flow Functional Computer for Real-Time Image Processing
This paper presents a data- ow computer, constituted of a large array of data- ow processors and programmed using a functional language, and its application to realtime image proc...
Georges Quénot, Bertrand Zavidovique
ICCV
2007
IEEE
14 years 18 days ago
USSR: A Unified Framework for Simultaneous Smoothing, Segmentation, and Registration of Multiple Images
Image smoothing, segmentation and registration are three key processing steps in many computer vision applications. In this paper, we present a novel framework for achieving all t...
Nicholas A. Lord, Jeffrey Ho, Baba C. Vemuri