Sciweavers

1478 search results - page 202 / 296
» Modeling user activities in a large IPTV system
Sort
View
AVSS
2007
IEEE
15 years 8 months ago
Towards robust face recognition for Intelligent-CCTV based surveillance using one gallery image
In recent years, the use of Intelligent Closed-Circuit Television (ICCTV) for crime prevention and detection has attracted significant attention. Existing face recognition system...
Ting Shan, Shaokang Chen, Conrad Sanderson, Brian ...
HICSS
2005
IEEE
163views Biometrics» more  HICSS 2005»
15 years 7 months ago
Survey of Strategic Alignment Impacts on Organizational Performance in International European Companies
act The strategic use of technology based information systems (IS/IT) is a fundamental issue for every business. This is particularly true in the case of firms that engage in inter...
Hajer Kefi, Michel Kalika
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
MOBIHOC
2001
ACM
16 years 1 months ago
Effects of power conservation, wireless coverage and cooperation on data dissemination among mobile devices
This paper presents 7DS, a novel peer-to-peer data sharing system. 7DS is an architecture, a set of protocols and an implementation enabling the exchange of data among peers that ...
Maria Papadopouli, Henning Schulzrinne
ICRA
2005
IEEE
162views Robotics» more  ICRA 2005»
15 years 7 months ago
Learning to Track Multiple People in Omnidirectional Video
— Meetings are a very important part of everyday life for professionals working in universities, companies or governmental institutions. We have designed a physical awareness sys...
Fernando De la Torre, Carlos Vallespí, Paul...