Sciweavers

8068 search results - page 1177 / 1614
» Java Data Objects
Sort
View
ASWEC
2006
IEEE
15 years 11 months ago
Formally Analysing a Security Protocol for Replay Attacks
The Kerberos-One-Time protocol is a key distribution protocol promoted for use with Javacards to provide secure communication over the GSM mobile phone network. From inspection we...
Benjamin W. Long, Colin J. Fidge
AUIC
2006
IEEE
15 years 11 months ago
An interface test-bed for 'Kansei' filters using the touch designer visual programming environment
In the context of a larger project dealing with kansei analysis of movement, we present a basic method for applying real-time filters to human motion capture data in order to modi...
Rodney Berry, Masahide Naemura, Yuichi Kobayashi, ...
AVSS
2006
IEEE
15 years 11 months ago
An Online Discriminative Approach to Background Subtraction
We present a simple, principled approach to detecting foreground objects in video sequences in real-time. Our method is based on an on-line discriminative learning technique that ...
Li Cheng, Shaojun Wang, Dale Schuurmans, Terry Cae...
151
Voted
CRV
2006
IEEE
223views Robotics» more  CRV 2006»
15 years 11 months ago
Disparity Map Estimation Using A Total Variation Bound
This paper describes a new variational method for estimating disparity from stereo images. The stereo matching problem is formulated as a convex programming problem in which an ob...
Wided Miled, Jean-Christophe Pesquet
CRV
2006
IEEE
160views Robotics» more  CRV 2006»
15 years 11 months ago
Multiple-Sensor Indoor Surveillance System
This paper describes a surveillance system that uses a network of sensors of different kind for localizing and tracking people in an office environment. The sensor network consist...
Valery A. Petrushin, Gang Wei, Omer Shakil, Damian...
« Prev « First page 1177 / 1614 Last » Next »