Sciweavers

162 search results - page 18 / 33
» Secure video processing: Problems and challenges
Sort
View
ICIP
2010
IEEE
13 years 5 months ago
Human action recognition using the motion of interest points
Even if the problem of human action categorization from videos has received a lot of attention during the past decade, it remains a challenging problem in operative conditions due...
Francesco Monti, Carlo S. Regazzoni
ESORICS
2011
Springer
12 years 7 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
NOSSDAV
2010
Springer
14 years 5 days ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
IVC
2010
143views more  IVC 2010»
13 years 5 months ago
Video-based face model fitting using Adaptive Active Appearance Model
Active Appearance Model (AAM) represents the shape and appearance of an object via two low-dimensional subspaces, one for shape and one for appearance. AAM for facial images is cu...
Xiaoming Liu
ICIP
2010
IEEE
13 years 5 months ago
Real-time interactive multi-target tracking using kernel-based trackers
Although kernel-based methods have been demonstrated effectively in solving single-target tracking problem, facing more complicated multi-target tracking task, most of them still ...
Guorong Li, Wei Qu, Qingming Huang