Feature trajectories have shown to be efficient for representing videos. Typically, they are extracted using the KLT tracker or matching SIFT descriptors between frames. However,...
Heng Wang, Alexander Kläser, Cordelia Schmid, Che...
: We study a simple general scenario of ad hoc networks based on IEEE 802.11 wireless communications, consisting in a chain of transmitters, each of them being in the carrier sense...
TION ABSTRACT Personalised Video Retrieval: Application of Implicit Feedback and Semantic User Profiles Frank Hopfgartner University of Glasgow Glasgow G12 8QQ United Kingdom A ch...
We revisit meet-in-the-middle attacks on block ciphers and recent developments in meet-in-the-middle preimage attacks on hash functions. Despite the presence of a secret key in the...
Lei Wei, Christian Rechberger, Jian Guo 0001, Hong...
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...