Sciweavers

723 search results - page 57 / 145
» Automatic Face Reenactment
Sort
View
CSL
2010
Springer
15 years 1 months ago
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries
Abstract. We present a symbolic framework, based on a modular operational semantics, for formalizing different notions of compromise relevant for the analysis of cryptographic prot...
David A. Basin, Cas J. F. Cremers
ISWC
2002
IEEE
15 years 4 months ago
Threat Response: A Compelling Application for Wearable Computing
This paper explores the application of wearable computer systems to threat response, exemplified by the Multi-functional Micro-controllable Interface Module (MMIM)/Digital Militar...
Noa M. Rensing, Evan Weststrate, Paul M. Zavracky,...
NIPS
2001
15 years 1 months ago
Categorization by Learning and Combining Object Parts
We describe an algorithm for automatically learning discriminative components of objects with SVM classifiers. It is based on growing image parts by minimizing theoretical bounds ...
Bernd Heisele, Thomas Serre, Massimiliano Pontil, ...
IJCAI
2007
15 years 1 months ago
Robust Object Tracking with a Case-Base Updating Strategy
The paper describes a simple but effective framework for visual object tracking in video sequences. The main contribution of this work lies in the introduction of a case-based rea...
Wenhui Liao, Yan Tong, Zhiwei Zhu, Qiang Ji
COMPLEX
2009
Springer
15 years 6 months ago
Toward Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing
Security vendors are facing a serious problem of defeating the complexity of malwares. With the popularity and the variety of zeroday malware over the Internet, generating their si...
Wei Yan, Erik Wu