Sciweavers

380 search results - page 33 / 76
» Time Capsule Signature
Sort
View
CVPR
2008
IEEE
14 years 8 months ago
Real-Time Face Pose Estimation from Single Range Images
We present a real-time algorithm to estimate the 3D pose of a previously unseen face from a single range im- age. Based on a novel shape signature to identify noses in range ima...
Michael D. Breitenstein, Daniel Küttel, Thiba...
ICISC
2004
169views Cryptology» more  ICISC 2004»
13 years 10 months ago
ADWICE - Anomaly Detection with Real-Time Incremental Clustering
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Kalle Burbeck, Simin Nadjm-Tehrani
ESTIMEDIA
2007
Springer
14 years 2 months ago
Signature-based Microprocessor Power Modeling for Rapid System-level Design Space Exploration
This paper presents a technique for high-level power estimation of microprocessors. The technique, which is based on abstract execution profiles called ’event signatures’, op...
Peter van Stralen, Andy D. Pimentel
IBPRIA
2007
Springer
14 years 2 months ago
Unidimensional Multiscale Local Features for Object Detection Under Rotation and Mild Occlusions
Abstract. In this article, scale and orientation invariant object detection is performed by matching intensity level histograms. Unlike other global measurement methods, the presen...
Michael Villamizar, Alberto Sanfeliu, Juan Andrade...
ADHOCNOW
2006
Springer
14 years 2 months ago
Authenticated In-Network Programming for Wireless Sensor Networks
Abstract. Current in-network programming protocols for sensor networks allow an attacker to gain control of the network or disrupt its proper functionality by disseminating malicio...
Ioannis Krontiris, Tassos Dimitriou