Sciweavers

2259 search results - page 239 / 452
» Separation and information hiding
Sort
View
ACSAC
2006
IEEE
14 years 4 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
ISCAS
2006
IEEE
73views Hardware» more  ISCAS 2006»
14 years 4 months ago
Rate-distortion optimization for fast hierarchical B-picture transcoding
— an efficient rate-distortion (R-D) optimal method for transcoding hierarchical B-pictures is proposed in this paper. A new R-D model is presented for fast transcoding hierarchi...
Huifeng Shen, Xiaoyan Sun, Feng Wu, Shipeng Li
CVPR
2010
IEEE
14 years 4 months ago
Recognizing Human Actions from Still Images with Latent Poses
We consider the problem of recognizing human actions from still images. We propose a novel approach that treats the pose of the person in the image as latent variables that will h...
Weilong Yang, Yang Wang, Greg Mori
ICRA
2005
IEEE
109views Robotics» more  ICRA 2005»
14 years 4 months ago
Toward 30-gram Autonomous Indoor Aircraft: Vision-based Obstacle Avoidance and Altitude Control
Abstract— We aim at developing autonomous microflyers capable of navigating within houses or small built environments. The severe weight and energy constraints of indoor flying...
Jean-Christophe Zufferey, Dario Floreano
QSIC
2005
IEEE
14 years 4 months ago
Systematic Incremental Development of Agent Systems, using Prometheus
This paper presents a mechanism for dividing an agent oriented application into the three IEEE defined scoping levels of essential, conditional and optional. This mechanism is ap...
Mikhail Perepletchikov, Lin Padgham