Sciweavers

12183 search results - page 150 / 2437
» Computers under Attacks!
Sort
View
149
Voted
SUTC
2010
IEEE
15 years 8 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
204
Voted
ICCV
2009
IEEE
1103views Computer Vision» more  ICCV 2009»
16 years 8 months ago
Piecewise-Consistent Color Mappings of Images Acquired Under Various Conditions
Many applications in computer vision require comparisons between two images of the same scene. Comparison applications usually assume that corresponding regions in the two image...
S. Kagarlitsky, Y. Moses, and Y. Hel-Or
CVPR
2005
IEEE
16 years 7 months ago
Eye Gaze Tracking under Natural Head Movements
Most available remote eye gaze trackers based on Pupil Center Corneal Reflection (PCCR) technique have two characteristics that prevent them from being widely used as an important...
Zhiwei Zhu, Qiang Ji
ECCV
2002
Springer
16 years 6 months ago
Maximizing Rigidity: Optimal Matching under Scaled-Orthography
Establishing point correspondences between images is a key step for 3D-shape computation. Nevertheless, shape extraction and point correspondence are treated, usually, as two diffe...
João Costeira, João Maciel
ICPR
2004
IEEE
16 years 6 months ago
Towards Shape from Shading under Realistic Photographic Conditions
This paper describes a new modeling of the shape from shading problem taking perspective projection into account, and proposes a method of resolution for the new equation. An appl...
Alain Crouzil, Frédéric Courteille, ...