Sciweavers

656 search results - page 66 / 132
» Symbolic computing of nonlinear observable and observer form...
Sort
View
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
13 years 14 days ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
COORDINATION
2007
Springer
14 years 3 months ago
Reactors: A Data-Oriented Synchronous/Asynchronous Programming Model for Distributed Applications
Our aim is to define the kernel of a simple and uniform programming model—the reactor model—suitable for building and evolving internet-scale programs. A reactor consists of t...
John Field, Maria-Cristina V. Marinescu, Christian...
ICPR
2008
IEEE
14 years 10 months ago
Robust auto-calibration of a PTZ camera with non-overlapping FOV
We consider the problem of auto-calibration of cameras, which are fixed in location but are free to rotate while changing their internal parameters by zooming. Our method is based...
Hassan Foroosh, Nazim Ashraf
CHI
2009
ACM
14 years 9 months ago
Turning the tables: an interactive surface for vjing
In this paper we describe VPlay, a multi-touch tabletop application that allows users to mix and manipulate multiple video streams in real-time. Our aim is to explore how such an ...
Armando Garcia-Mendoza, David S. Kirk, Richard H. ...
ACCV
2007
Springer
14 years 3 months ago
Hand Posture Estimation in Complex Backgrounds by Considering Mis-match of Model
This paper proposes a novel method of estimating 3-D hand posture from images observed in complex backgrounds. Conventional methods often cause mistakes by mis-matches of local ima...
Akihiro Imai, Nobutaka Shimada, Yoshiaki Shirai