Sciweavers

2553 search results - page 384 / 511
» Evaluating machine creativity
Sort
View
SCIA
2009
Springer
132views Image Analysis» more  SCIA 2009»
15 years 11 months ago
Instant Action Recognition
In this paper, we present an efficient system for action recognition from very short sequences. For action recognition typically appearance and/or motion information of an action ...
Thomas Mauthner, Peter M. Roth, Horst Bischof
SOUPS
2009
ACM
15 years 11 months ago
Conditioned-safe ceremonies and a user study of an application to web authentication
We introduce the notion of a conditioned-safe ceremony. A “ceremony” is similar to the conventional notion of a protocol, except that a ceremony explicitly includes human part...
Chris Karlof, J. D. Tygar, David Wagner
FGR
2008
IEEE
358views Biometrics» more  FGR 2008»
15 years 11 months ago
Automatic 3D face reconstruction from single images or video
This paper presents a fully automated algorithm for reconstructing a textured 3D model of a face from a single photograph or a raw video stream. The algorithm is based on a combin...
Pia Breuer, Kwang In Kim, Wolf Kienzle, Bernhard S...
HPCA
2008
IEEE
15 years 11 months ago
Prediction of CPU idle-busy activity pattern
Real-world workloads rarely saturate multi-core processor. CPU C-states can be used to reduce power consumption during processor idle time. The key unsolved problem is: when and h...
Qian Diao, Justin J. Song
ICEIS
2008
IEEE
15 years 11 months ago
Next-Generation Misuse and Anomaly Prevention System
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Pablo Garcia Bringas, Yoseba K. Penya