Sciweavers

5948 search results - page 1116 / 1190
» Computing Robust Counter-Strategies
Sort
View
ICCV
2009
IEEE
15 years 5 months ago
Multiperspective Stereo Matching and Volumetric Reconstruction
Stereo matching and volumetric reconstruction are the most explored 3D scene recovery techniques in computer vision. Many existing approaches assume perspective input images and us...
Yuanyuan Ding, Jingyi Yu, and Peter Sturm
CHI
2010
ACM
15 years 4 months ago
Social gravity: a virtual elastic tether for casual, privacy-preserving pedestrian rendezvous
We describe a virtual “tether” for mobile devices that allows groups to have quick, simple and privacy-preserving meetups. Our design provides cues which allow dynamic coordin...
John Williamson, Simon Robinson, Craig Stewart, Ro...
CVPR
2009
IEEE
15 years 4 months ago
Tubular anisotropy for 2D vessel segmentation
In this paper, we present a new approach for segmentation of tubular structures in 2D images providing minimal interaction. The main objective is to extract centerlines and bounda...
Fethallah Benmansour, Laurent D. Cohen, Max W. K. ...
WISEC
2009
ACM
15 years 4 months ago
Link-layer protection in 802.11i WLANS with dummy authentication
The current 802.11i standard can provide data confidentiality, integrity and mutual authentication in enterprise Wireless Local Area Networks (WLANs). However, secure communicati...
Zhimin Yang, Adam C. Champion, Boxuan Gu, Xiaole B...
CCS
2009
ACM
15 years 4 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson
« Prev « First page 1116 / 1190 Last » Next »