Sciweavers

1173 search results - page 77 / 235
» Identifying Successful Telecommuters
Sort
View
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
15 years 9 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
ACCV
2006
Springer
15 years 8 months ago
Double Regularized Bayesian Estimation for Blur Identification in Video Sequences
Blind blur identification in video sequences becomes more important. This paper presents a new method for identifying parameters of different blur kernels and image restoration in ...
Hongwei Zheng, Olaf Hellwich
135
Voted
FGR
2004
IEEE
114views Biometrics» more  FGR 2004»
15 years 8 months ago
Combining Motion Segmentation with Tracking for Activity Analysis
We explore a novel motion feature as the appropriate basis for classifying or describing a number of fine motor human activities.Ourapproach not only estimates motion directions a...
Jiang Gao, Alexander G. Hauptmann, Howard D. Wactl...
143
Voted
ESOA
2006
15 years 8 months ago
Hybrid Multi-agent Systems: Integrating Swarming and BDI Agents
The individual agents that interact in a multi-agent system typically exist along a continuum ranging from heavyweight cognitive agents (often of the "BDI" type) to light...
H. Van Dyke Parunak, Paul Nielsen, Sven Brueckner,...
142
Voted
CAEPIA
2003
Springer
15 years 8 months ago
Employing TSK Fuzzy Models to Automate the Revision Stage of a CBR System
CBR systems are normally used to assist experts in the resolution of problems. During the last few years, researchers have been working in the development of techniques to automate...
Florentino Fernández Riverola, Juan M. Corc...