Sciweavers

20778 search results - page 3754 / 4156
» Algorithms for Data Migration
Sort
View
ACCV
2009
Springer
15 years 6 months ago
Person De-identification in Videos
Advances in cameras and web technology have made it easy to capture and share large amounts of video data over to a large number of people. A large number of cameras oversee public...
Prachi Agrawal, P. J. Narayanan
AMW
2009
15 years 6 months ago
Using Patterns for Faster and Scalable Rewriting of Conjunctive Queries
Abstract. Rewriting of conjunctive queries using views has many applications in database and data integration. We investigate ways to improve performance of rewriting and propose a...
Ali Kiani, Nematollaah Shiri
CHES
2010
Springer
159views Cryptology» more  CHES 2010»
15 years 6 months ago
Provably Secure Higher-Order Masking of AES
Implementations of cryptographic algorithms are vulnerable to Side Channel Analysis (SCA). To counteract it, masking schemes are usually involved which randomize key-dependent data...
Matthieu Rivain, Emmanuel Prouff
ECAI
2010
Springer
15 years 6 months ago
Constraint-Based Controller Synthesis in Non-Deterministic and Partially Observable Domains
Controller synthesis consists in automatically building controllers taking as inputs observation data and returning outputs guaranteeing that the controlled system satisfies some d...
Cédric Pralet, Gérard Verfaillie, Mi...
ECCV
2010
Springer
15 years 6 months ago
Intrinsic Regularity Detection in 3D Geometry
Abstract. Automatic detection of symmetries, regularity, and repetitive structures in 3D geometry is a fundamental problem in shape analysis and pattern recognition with applicatio...
Niloy J. Mitra, Alexander M. Bronstein, Michael M....
« Prev « First page 3754 / 4156 Last » Next »