Sciweavers

1361 search results - page 176 / 273
» Spaces of practice
Sort
View
155
Voted
PERCOM
2007
ACM
16 years 3 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
114
Voted
CVPR
2009
IEEE
16 years 26 days ago
Recognizing human group activities with localized causalities
The aim of this paper is to address the problem of recognizing human group activities in surveillance videos. This task has great potentials in practice, however was rarely studie...
Ashraf A. Kassim, Bingbing Ni, Shuicheng Yan
144
Voted
ALT
2003
Springer
16 years 11 days ago
Kernel Trick Embedded Gaussian Mixture Model
In this paper, we present a kernel trick embedded Gaussian Mixture Model (GMM), called kernel GMM. The basic idea is to embed kernel trick into EM algorithm and deduce a parameter ...
Jingdong Wang, Jianguo Lee, Changshui Zhang
112
Voted
ICCAD
2002
IEEE
143views Hardware» more  ICCAD 2002»
16 years 9 days ago
A Markov chain sequence generator for power macromodeling
In macromodeling-based power estimation, circuit macromodels are created from simulations of synthetic input vector sequences. Fast generation of these sequences with all possible...
Xun Liu, Marios C. Papaefthymiou
128
Voted
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 10 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...