Sciweavers

859 search results - page 93 / 172
» The Changing Face of Cryptography
Sort
View
MOBISYS
2009
ACM
14 years 10 months ago
EnTracked: energy-efficient robust position tracking for mobile devices
An important feature of a modern mobile device is that it can position itself. Not only for use on the device but also for remote applications that require tracking of the device....
Mikkel Baun Kjærgaard, Jakob Langdal, Torben...
CVPR
2005
IEEE
15 years 2 days ago
Implicit Surfaces Make for Better Silhouettes
This paper advocates an implicit-surface representation of generic 3?D surfaces to take advantage of occluding edges in a very robust way. This lets us exploit silhouette constrai...
Slobodan Ilic, Mathieu Salzmann, Pascal Fua
ECCV
2004
Springer
14 years 12 months ago
Temporal Factorization vs. Spatial Factorization
The traditional subspace-based approaches to segmentation (often referred to as multi-body factorization approaches) provide spatial clustering/segmentation by grouping together po...
Lihi Zelnik-Manor, Michal Irani
CIVR
2009
Springer
315views Image Analysis» more  CIVR 2009»
14 years 9 months ago
Exploiting Facial Expressions for Affective Video Summarisation
This paper presents an approach to affective video summarization based on the facial expressions (FX) of viewers. A facial expression recognition system was deployed to capture a v...
Hideo Joho, Joemon M. Jose, Roberto Valenti, Nicu ...
HICSS
2010
IEEE
130views Biometrics» more  HICSS 2010»
14 years 5 months ago
On the Reliability of Software Piracy Statistics
Despite tremendous debate and policy interest in software piracy, the accuracy of piracy statistics compiled by the Business Software Alliance (BSA) has been accepted at face valu...
Ivan P. L. Png