Sciweavers

1898 search results - page 85 / 380
» Weak Keys for IDEA
Sort
View
ICIP
2009
IEEE
13 years 6 months ago
Task-oriented camera assignment in a video network
Camera assignment and hand-off are some of the key image processing problems in a video network. In this paper, we propose a new approach for camera assignment and handoff in a vi...
Yiming Li, Bir Bhanu
CVPR
2011
IEEE
13 years 5 months ago
Learning to Recognize Objects in Egocentric Activities
This paper addresses the problem of learning object models from egocentric video of household activities, using extremely weak supervision. For each activity sequence, we know onl...
Alireza Fathi, Xiaofeng Ren, James Rehg
RFIDSEC
2010
13 years 3 months ago
EC-RAC: Enriching a Capacious RFID Attack Collection
Abstract. We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first class of attacks concerns the compositional approach used to construct a parti...
Ton van Deursen, Sasa Radomirovic
SIAMMA
2010
45views more  SIAMMA 2010»
13 years 3 months ago
Nonlinear Cross-Diffusion with Size Exclusion
The aim of this paper is to investigate the mathematical properties of a continuum model for diffusion of multiple species incorporating size exclusion effects. The system for two ...
Martin Burger, Marco Di Francesco, Jan-Frederik Pi...
IACR
2011
139views more  IACR 2011»
12 years 8 months ago
SGCM: The Sophie Germain Counter Mode
Abstract. Sophie Germain Counter Mode (SGCM) is an authenticated encryption mode of operation, to be used with 128-bit block ciphers such as AES. SGCM is a variant of the NIST stan...
Markku-Juhani O. Saarinen