Sciweavers

2259 search results - page 413 / 452
» Separation and information hiding
Sort
View
TIT
2010
146views Education» more  TIT 2010»
13 years 3 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
NAR
2011
203views Computer Vision» more  NAR 2011»
12 years 11 months ago
Laminin database: a tool to retrieve high-throughput and curated data for studies on laminins
The Laminin(LM)-database, hosted at http://www .lm.lncc.br, is the first database focusing a noncollagenous extracellular matrix protein family, the LMs. Part of the knowledge ava...
Daiane C. F. Golbert, Leandra Linhares-Lacerda, Lu...
CODASPY
2012
12 years 4 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
ICCV
2009
IEEE
1335views Computer Vision» more  ICCV 2009»
15 years 1 months ago
Top-Down Color Attention for Object Recognition
Generally the bag-of-words based image representation follows a bottom-up paradigm. The subsequent stages of the process: feature detection, feature description, vocabulary cons...
Fahad Shahbaz Khan, Joost van de Weijer, Maria Van...
CVPR
2004
IEEE
14 years 10 months ago
Fast, Integrated Person Tracking and Activity Recognition with Plan-View Templates from a Single Stereo Camera
Copyright 2004 IEEE. Published in Conference on Computer Vision and Pattern Recognition (CVPR-2004), June 27 - July 2, 2004, Washington DC. Personal use of this material is permit...
Michael Harville, Dalong Li