Sciweavers

799 search results - page 128 / 160
» Improving the feasibility pump
Sort
View
INFOCOM
2011
IEEE
14 years 3 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICCV
2011
IEEE
13 years 12 months ago
Trajectory reconstruction from non-overlapping surveillance cameras with relative depth ordering constraints
We present a method for reconstructing a trajectory of an object moving in front of non-overlapping fully or partially calibrated cameras. The non-overlapping setup turns that pro...
Branislav Micusik
ICCV
2011
IEEE
13 years 12 months ago
A Data-Driven Approach for Real-Time Full Body Pose Reconstruction from a Depth Camera
In recent years, depth cameras have become a widely available sensor type that captures depth images at realtime frame rates. Even though recent approaches have shown that 3D pose...
Andreas Baak, Meinard Muller, Gaurav Bharaj, Hans-...
PAM
2010
Springer
15 years 6 months ago
A Learning-Based Approach for IP Geolocation
The ability to pinpoint the geographic location of IP hosts is compelling for applications such as on-line advertising and network attack diagnosis. While prior methods can accurat...
Brian Eriksson, Paul Barford, Joel Sommers, Robert...
IIS
2003
15 years 1 months ago
Web Search Results Clustering in Polish: Experimental Evaluation of Carrot
Abstract. In this paper we consider the problem of web search results clustering in the Polish language, supporting our analysis with results acquired from an experimental system n...
Dawid Weiss, Jerzy Stefanowski