Sciweavers

3116 search results - page 201 / 624
» Recovering
Sort
View
MLMI
2007
Springer
14 years 4 months ago
Gaussian Process Latent Variable Models for Human Pose Estimation
We describe a method for recovering 3D human body pose from silhouettes. Our model is based on learning a latent space using the Gaussian Process Latent Variable Model (GP-LVM) [1]...
Carl Henrik Ek, Philip H. S. Torr, Neil D. Lawrenc...
PROVSEC
2007
Springer
14 years 4 months ago
CCA2-Secure Threshold Broadcast Encryption with Shorter Ciphertexts
In a threshold broadcast encryption scheme, a sender chooses (ad-hoc) a set of n receivers and a threshold t, and then encrypts a message by using the public keys of all the recei...
Vanesa Daza, Javier Herranz, Paz Morillo, Carla R&...
SEKE
2007
Springer
14 years 4 months ago
Classification of Design Pattern Traits
Design patterns describe good solutions to common and recurring problems. The applications of design patterns may vary in different layouts, which pose challenges for recovering a...
Jing Dong, Yajing Zhao
SEMWEB
2007
Springer
14 years 4 months ago
Ontology Revision as Non-Prioritized Belief Revision
Ontology revision is the process of managing an ontology when a new axiom or fact would render it inconsistent. So far, the AGM approach to belief revision has been adapted to work...
Mauro Mazzieri, Aldo Franco Dragoni
WISA
2007
Springer
14 years 4 months ago
Breaking 104 Bit WEP in Less Than 60 Seconds
We demonstrate an active attack on the WEP protocol that is able to recover a 104-bit WEP key using less than 40,000 frames with a success probability of 50%. In order to succeed i...
Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin