Sciweavers

162 search results - page 25 / 33
» Secure video processing: Problems and challenges
Sort
View
IWCMC
2006
ACM
14 years 1 months ago
Modeling key agreement in multi-hop ad hoc networks
Securing multicast communications in ad hoc networks has become one of the most challenging research directions in the areas of wireless networking and security. This is especiall...
Giovanni Di Crescenzo, Maria Striki, John S. Baras
CCS
2009
ACM
14 years 2 months ago
Large-scale malware indexing using function-call graphs
A major challenge of the anti-virus (AV) industry is how to effectively process the huge influx of malware samples they receive every day. One possible solution to this problem i...
Xin Hu, Tzi-cker Chiueh, Kang G. Shin
CVPR
2006
IEEE
14 years 9 months ago
Intelligent Collaborative Tracking by Mining Auxiliary Objects
Many tracking methods face a fundamental dilemma in practice: tracking has to be computationally efficient but verifying if or not the tracker is following the true target tends t...
Ming Yang, Ying Wu, Shihong Lao
ICIP
2008
IEEE
14 years 9 months ago
Subspace-based methods for image registration and super-resolution
Super-resolution algorithms combine multiple low resolution images into a single high resolution image. They have received a lot of attention recently in various application domai...
Patrick Vandewalle, Loïc Baboulaz, Pier Luigi...
IBPRIA
2005
Springer
14 years 27 days ago
Robust Person-Independent Visual Sign Language Recognition
Sign language recognition constitutes a challenging field of research in computer vision. Common problems like overlap, ambiguities, and minimal pairs occur frequently and require...
Jörg Zieren, Karl-Friedrich Kraiss