Sciweavers

1215 search results - page 168 / 243
» Framework for Personal TV
Sort
View
AVSS
2007
IEEE
15 years 4 months ago
Detection of abandoned objects in crowded environments
With concerns about terrorism and global security on the rise, it has become vital to have in place efficient threat detection systems that can detect and recognize potentially da...
Medha Bhargava, Chia-Chih Chen, Michael S. Ryoo, J...
ICDE
2007
IEEE
223views Database» more  ICDE 2007»
15 years 4 months ago
Privacy Access Control Model with Location Constraints for XML Services
Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
Yi Zheng, Yongming Chen, Patrick C. K. Hung
ROMAN
2007
IEEE
181views Robotics» more  ROMAN 2007»
15 years 4 months ago
Efficient Articulated Model Fitting on a Single Image or a Sequence
Abstract—Models that can efficiently, compactly, and semantically represent potential users are important tools for human-robot interaction applications. We model a person as a p...
Matheen Siddiqui, Gérard G. Medioni
ACCV
2007
Springer
15 years 4 months ago
Learning Generative Models for Monocular Body Pose Estimation
We consider the problem of monocular 3d body pose tracking from video sequences. This task is inherently ambiguous. We propose to learn a generative model of the relationship of bo...
Tobias Jaeggli, Esther Koller-Meier, Luc J. Van Go...
ASIACRYPT
2007
Springer
15 years 4 months ago
Secure Protocols with Asymmetric Trust
Abstract. In the standard general-adversary model for multi-party protocols, a global adversary structure is given, and every party must trust in this particular structure. We intr...
Ivan Damgård, Yvo Desmedt, Matthias Fitzi, J...