Sciweavers

8177 search results - page 1514 / 1636
» Detecting System Emulators
Sort
View
ICCV
2011
IEEE
14 years 3 months ago
Probabilistic Group-Level Motion Analysis and Scenario Recognition
This paper addresses the challenge of recognizing behavior of groups of individuals in unconstraint surveillance environments. As opposed to approaches that rely on agglomerative ...
Ming-Ching Chang, Nils Krahnstoever, Weina Ge
161
Voted
3DIM
2011
IEEE
14 years 3 months ago
Stereo Reconstruction of Building Interiors with a Vertical Structure Prior
—Image-based computation of a 3D map for an indoor environment is a very challenging task, but also a useful step for vision-based navigation and path planning for autonomous sys...
Bernhard Zeisl, Christopher Zach, Marc Pollefeys
147
Voted
CSFW
2011
IEEE
14 years 3 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
265
Voted
ICDAR
2011
IEEE
14 years 3 months ago
Text/Graphics Segmentation in Architectural Floor Plans
—In this paper, we propose an improved method for text/graphics segmentation. Text/graphics separation is a crucial preprocessing step in document analysis before further analysi...
Sheraz Ahmed, Markus Weber, Marcus Liwicki, Andrea...

Publication
283views
14 years 2 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
« Prev « First page 1514 / 1636 Last » Next »