Sciweavers

10602 search results - page 17 / 2121
» Weakly Useful Sequences
Sort
View
ECCV
2008
Springer
14 years 11 months ago
Scale Invariant Action Recognition Using Compound Features Mined from Dense Spatio-temporal Corners
Abstract. The use of sparse invariant features to recognise classes of actions or objects has become common in the literature. However, features are often "engineered" to...
Andrew Gilbert, John Illingworth, Richard Bowden
ICUIMC
2009
ACM
14 years 3 months ago
Bilinear-pairing-based remote user authentication schemes using smart cards
This paper presents a detailed review of remote user authentication schemes with smart cards based on bilinear pairings. The first scheme regarding this was proposed by Manik et a...
Al-Sakib Khan Pathan, Choong Seon Hong
JSAC
2010
170views more  JSAC 2010»
13 years 3 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
CATS
2008
13 years 10 months ago
Weak Parametric Failure Equivalences and Their Congruence Formats
Weak equivalences are important behavioral equivalences in the course of specifying and analyzing the reactive systems using process algebraic languages. In this paper, we propose...
Xiaowei Huang, Li Jiao, Weiming Lu
ICML
2005
IEEE
14 years 10 months ago
Q-learning of sequential attention for visual object recognition from informative local descriptors
This work provides a framework for learning sequential attention in real-world visual object recognition, using an architecture of three processing stages. The first stage rejects...
Lucas Paletta, Gerald Fritz, Christin Seifert