Sciweavers

2255 search results - page 380 / 451
» Computing a Center-Transversal Line
Sort
View
99
Voted
FCCM
2004
IEEE
269views VLSI» more  FCCM 2004»
15 years 2 months ago
FPGA Based Network Intrusion Detection using Content Addressable Memories
In this paper, we introduce a novel architecture for a hardware based network intrusion detection system (NIDS). Current software-based NIDS are too compute intensive and can not ...
Long Bu, John A. Chandy
115
Voted
FGR
2004
IEEE
164views Biometrics» more  FGR 2004»
15 years 2 months ago
Real-Time Pointing Gesture Recognition for an Immersive Environment
We present an algorithm for the real-time detection and interpretation of pointing gestures, performed with one or both arms. The pointing gestures are used as an intuitive tracki...
Roland Kehl, Luc J. Van Gool
CRYPTO
2006
Springer
108views Cryptology» more  CRYPTO 2006»
15 years 2 months ago
Inverting HFE Is Quasipolynomial
In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
Louis Granboulan, Antoine Joux, Jacques Stern
110
Voted
ICRA
2000
IEEE
145views Robotics» more  ICRA 2000»
15 years 2 months ago
Feature Based Condensation for Mobile Robot Localization
Much attention has been given to CONDENSATION methods for mobile robot localization. This has resulted in somewhat of a breakthrough in representing uncertainty for mobile robots....
Patric Jensfelt, David J. Austin, Olle Wijk, Magnu...
KES
2000
Springer
15 years 2 months ago
Extracting geometric models from medieval moulding profiles for case-based reasoning
Cross-sectional pmfiles of medieval mouldings are often considered to be a vital form of data to Art Historians. Mouldings were often used to highlight salient areas of buildings,...
Gareth Bradshaw, Carol O'Sullivan