Sciweavers

482 search results - page 77 / 97
» An Object Tracking Scheme Based on Local Density
Sort
View
137
Voted
IJCV
2006
164views more  IJCV 2006»
15 years 5 months ago
Stochastic Motion and the Level Set Method in Computer Vision: Stochastic Active Contours
Based on recent work on Stochastic Partial Differential Equations (SPDEs), this paper presents a simple and well-founded method to implement the stochastic evolution of a curve. F...
Olivier Juan, Renaud Keriven, Gheorghe Postelnicu
MOBISYS
2003
ACM
16 years 4 months ago
The Lighthouse Location System for Smart Dust
Smart Dust sensor networks ? consisting of cubic millimeter scale sensor nodes capable of limited computation, sensing, and passive optical communication with a base station ? are...
Kay Römer
ICDE
2007
IEEE
148views Database» more  ICDE 2007»
16 years 6 months ago
Efficient Detection of Distributed Constraint Violations
In many distributed environments, the primary function of monitoring software is to detect anomalies, that is, instances when system behavior deviates substantially from the norm....
Shipra Agrawal, Supratim Deb, K. V. M. Naidu, Raje...
JOC
2007
133views more  JOC 2007»
15 years 4 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
CCS
2010
ACM
15 years 11 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...