Sciweavers

5948 search results - page 1030 / 1190
» Computing Robust Counter-Strategies
Sort
View
SCALESPACE
2005
Springer
15 years 9 months ago
Multiscale Active Contours
Abstract. In this paper, we propose an evolution equation for the active contours in scale spaces. This evolution equation is based on the Polyakov functional that has been first ...
Xavier Bresson, Pierre Vandergheynst, Jean-Philipp...
131
Voted
SCIA
2005
Springer
186views Image Analysis» more  SCIA 2005»
15 years 9 months ago
Building Detection from Mobile Imagery Using Informative SIFT Descriptors
We propose reliable outdoor object detection on mobile phone imagery from off-the-shelf devices. With the goal to provide both robust object detection and reduction of computation...
Gerald Fritz, Christin Seifert, Manish Kumar, Luca...
146
Voted
TRUSTBUS
2005
Springer
15 years 9 months ago
Securing Operating System Services Based on Smart Cards
The executions of operating system services based on smart cards allow one to personalize some functionalities of the operating system by using the secret information stored in a s...
Luigi Catuogno, Roberto Gassirà, Michele Ma...
123
Voted
UIST
2004
ACM
15 years 9 months ago
Visual tracking of bare fingers for interactive surfaces
Visual tracking of bare fingers allows more direct manipulation of digital objects, multiple simultaneous users interacting with their two hands, and permits the interaction on l...
Julien Letessier, François Bérard
129
Voted
WMASH
2004
ACM
15 years 9 months ago
Reputation-based Wi-Fi deployment protocols and security analysis
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet u...
Naouel Ben Salem, Jean-Pierre Hubaux, Markus Jakob...
« Prev « First page 1030 / 1190 Last » Next »