Sciweavers

5948 search results - page 388 / 1190
» Computing Robust Counter-Strategies
Sort
View
BMVC
2010
15 years 3 months ago
Real-time Action Recognition by Spatiotemporal Semantic and Structural Forests
Whereas most existing action recognition methods require computationally demanding feature extraction and/or classification, this paper presents a novel real-time solution that ut...
Tsz-Ho Yu, Tae-Kyun Kim, Roberto Cipolla
BMVC
2010
15 years 3 months ago
Discriminative Topics Modelling for Action Feature Selection and Recognition
This paper presents a framework for recognising realistic human actions captured from unconstrained environments. The novelties of this work lie in three aspects. First, we propos...
Matteo Bregonzio, Jian Li, Shaogang Gong, Tao Xian...
ICIP
2010
IEEE
15 years 3 months ago
The 2D orientation is unique through principal moments analysis
When comparing 2D shapes, a key issue is their normalization. Translation and scale are easily taken care of by removing the mean and normalizing the energy. However, defining and...
João F. P. Crespo, Pedro M. Q. Aguiar
DAC
2009
ACM
15 years 2 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic
EGH
2009
Springer
15 years 2 months ago
Accelerating shadow rays using volumetric occluders and modified kd-tree traversal
Monte Carlo ray tracing remains a simple and elegant method for generating robust shadows. This approach, however, is often hampered by the time needed to evaluate the numerous sh...
Peter Djeu, Sean Keely, Warren Hunt