Sciweavers

3732 search results - page 694 / 747
» Ubiquitous Computing for the Public
Sort
View
JOC
2010
82views more  JOC 2010»
13 years 4 months ago
A Verifiable Secret Shuffle of Homomorphic Encryptions
Abstract. A shuffle consists of a permutation and re-encryption of a set of input ciphertexts. One application of shuffles is to build mix-nets. We suggest an honest verifier zero-...
Jens Groth
TITB
2010
128views Education» more  TITB 2010»
13 years 4 months ago
Data-Centric Privacy Protocol for Intensive Care Grids
Abstract--Modern e-Health systems require advanced computing and storage capabilities, leading to the adoption of technologies like the grid and giving birth to novel health grid s...
J. Luna, Marios D. Dikaiakos, Manolis Marazakis, T...
CVPR
2011
IEEE
13 years 4 months ago
Stable Multi-Target Tracking in Real-Time Surveillance Video
The majority of existing pedestrian trackers concentrate on maintaining the identities of targets, however systems for remote biometric analysis or activity recognition in surveill...
Ben Benfold and Ian Reid
CVPR
2008
IEEE
14 years 11 months ago
Recognizing human actions using multiple features
In this paper, we propose a framework that fuses multiple features for improved action recognition in videos. The fusion of multiple features is important for recognizing actions ...
Jingen Liu, Saad Ali, Mubarak Shah
ICCV
2009
IEEE
13 years 7 months ago
Incremental action recognition using feature-tree
Action recognition methods suffer from many drawbacks in practice, which include (1)the inability to cope with incremental recognition problems; (2)the requirement of an intensive...
Kishore K. Reddy, Jingen Liu, Mubarak Shah