Sciweavers

482 search results - page 77 / 97
» An Object Tracking Scheme Based on Local Density
Sort
View
IJCV
2006
164views more  IJCV 2006»
15 years 18 days ago
Stochastic Motion and the Level Set Method in Computer Vision: Stochastic Active Contours
Based on recent work on Stochastic Partial Differential Equations (SPDEs), this paper presents a simple and well-founded method to implement the stochastic evolution of a curve. F...
Olivier Juan, Renaud Keriven, Gheorghe Postelnicu
102
Voted
MOBISYS
2003
ACM
16 years 6 days ago
The Lighthouse Location System for Smart Dust
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
Kay Römer
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 1 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
132
Voted
JOC
2007
133views more  JOC 2007»
15 years 15 days ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
126
Voted
CCS
2010
ACM
15 years 7 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...