Sciweavers

ACNS
2010
Springer
161views Cryptology» more  ACNS 2010»
15 years 8 months ago
Multi-trail Statistical Saturation Attacks
Abstract. Statistical Saturation Attacks have been introduced and applied to the block cipher PRESENT at CT-RSA 2009. In this paper, we consider their natural extensions. First, we...
Baudoin Collard, François-Xavier Standaert
ACCV
2009
Springer
15 years 8 months ago
A Harris-Like Scale Invariant Feature Detector
Image feature detection is a fundamental issue in computer vision. SIFT[1] and SURF[2] are very effective in scale-space feature detection, but their stabilities are not good enou...
Yinan Yu, Kaiqi Huang, Tieniu Tan
ACMIDC
2010
15 years 8 months ago
Digital Technologies and Marginalized Youth
Marginalization threatens basic issues of fairness and equal opportunity for a significant portion of children around the n this extended abstract, we frame the problem of margina...
Juan Pablo Hourcade, Natasha E. Bullock-Rest, Heid...
CVPR
2010
IEEE
15 years 8 months ago
Metric-Induced Optimal Embedding for Intrinsic 3D Shape Analysis
For various 3D shape analysis tasks, the LaplaceBeltrami(LB) embedding has become increasingly popular as it enables the efficient comparison of shapes based on intrinsic geometry...
Rongjie Lai, Yonggang Shi, Kevin Scheibel, Scott F...
ACCV
2009
Springer
15 years 8 months ago
Image Enhancement of Low-Light Scenes with Near-Infrared Flash Images
Abstract. We present a novel technique for enhancing an image captured in low light by using near-infrared flash images. The main idea is to combine a color image with near-infrar...
Sosuke Matsui, Takahiro Okabe, Mihoko Shimano, Yoi...