Sciweavers

6906 search results - page 1156 / 1382
» An algorithm for modelling key terms
Sort
View
190
Voted
CIVR
2008
Springer
207views Image Analysis» more  CIVR 2008»
15 years 6 months ago
Accumulated motion energy fields estimation and representation for semantic event detection
In this paper, a motion-based approach for detecting highlevel semantic events in video sequences is presented. Its main characteristic is its generic nature, i.e. it can be direc...
Georgios Th. Papadopoulos, Vasileios Mezaris, Ioan...
ATAL
2010
Springer
15 years 5 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
JOC
2000
181views more  JOC 2000»
15 years 4 months ago
Security Arguments for Digital Signatures and Blind Signatures
Abstract. Since the appearance of public-key cryptography in the seminal DiffieHellman paper, many new schemes have been proposed and many have been broken. Thus, the simple fact t...
David Pointcheval, Jacques Stern
GIS
2010
ACM
15 years 3 months ago
Bridge detection in grid terrains and improved drainage enforcement
Bare Earth gridded digital elevation models (DEMs) are often used to extract hydrologic features such as rivers and watersheds. DEMs must be conditioned by removing spurious sinks...
Ryan Carlson, Andrew Danner
179
Voted
SAC
2010
ACM
15 years 3 months ago
The 'Dresden Image Database' for benchmarking digital image forensics
This paper introduces and documents a novel image database specifically built for the purpose of development and benchmarking of camera-based digital forensic techniques. More th...
Thomas Gloe, Rainer Böhme
« Prev « First page 1156 / 1382 Last » Next »