Sciweavers

14078 search results - page 2627 / 2816
» Design and Analysis of Computer Algorithms
Sort
View
121
Voted
MM
2004
ACM
118views Multimedia» more  MM 2004»
15 years 9 months ago
Scene tunnels for seamless virtual tour
This paper proposes a visual representation named scene tunnel to archive and visualize urban scenes for Internet based virtual tour. We scan cityscapes using multiple cameras on ...
Jiang Yu Zheng, Yu Zhou
128
Voted
WPES
2004
ACM
15 years 9 months ago
Privacy management for portable recording devices
The growing popularity of inexpensive, portable recording devices, such as cellular phone cameras and compact digital audio recorders, presents a significant new threat to privac...
J. Alex Halderman, Brent R. Waters, Edward W. Felt...
138
Voted
ESORICS
2004
Springer
15 years 9 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen
182
Voted
ICMI
2004
Springer
281views Biometrics» more  ICMI 2004»
15 years 9 months ago
Articulatory features for robust visual speech recognition
Visual information has been shown to improve the performance of speech recognition systems in noisy acoustic environments. However, most audio-visual speech recognizers rely on a ...
Kate Saenko, Trevor Darrell, James R. Glass
136
Voted
POLICY
2004
Springer
15 years 9 months ago
Responding to Policies at Runtime in TrustBuilder
Automated trust negotiation is the process of establishing trust between entities with no prior relationship through the iterative disclosure of digital credentials. One approach ...
Bryan Smith, Kent E. Seamons, Michael D. Jones
« Prev « First page 2627 / 2816 Last » Next »