Sciweavers

1186 search results - page 198 / 238
» Progressive Modeling
Sort
View
SACRYPT
2007
Springer
141views Cryptology» more  SACRYPT 2007»
14 years 4 months ago
Analysis of Countermeasures Against Access Driven Cache Attacks on AES
Cache attacks on implementations of cryptographic algorithms have turned out to be very powerful. Progress in processor design, e.g., like hyperthreading, requires to adapt models ...
Johannes Blömer, Volker Krummel
ICCV
2011
IEEE
12 years 10 months ago
Multi-hypothesis Motion Planning for Visual Object Tracking
In this paper, we propose a long-term motion model for visual object tracking. In crowded street scenes, persistent occlusions are a frequent challenge for tracking algorithm and ...
Haifeng Gong, Jack Sim, Maxim Likhachev, Jianbo Sh...
FTRTFT
1998
Springer
14 years 2 months ago
Fair Synchronous Transition Systems and Their Liveness Proofs
We present a compositional semantics of synchronous systems that captures both safety and progress properties of such systems. The fair synchronous transitions systems (fsts) mode...
Amir Pnueli, Natarajan Shankar, Eli Singerman
IWDW
2007
Springer
14 years 4 months ago
Steganalysis Versus Splicing Detection
Aiming at detecting secret information hidden in a given image using steganographic tools, steganalysis has been of interest since the end of 1990’s. In particular, universal ste...
Yun Q. Shi, Chunhua Chen, Guorong Xuan, Wei Su
WWW
2007
ACM
14 years 10 months ago
Open user profiles for adaptive news systems: help or harm?
Over the last five years, a range of projects have focused on progressively more elaborated techniques for adaptive news delivery. However, the adaptation process in these systems...
Jae-wook Ahn, Peter Brusilovsky, Jonathan Grady, D...