Sciweavers

6047 search results - page 1073 / 1210
» Modeling with Extend
Sort
View
CVPR
2012
IEEE
13 years 4 months ago
Adaptive object tracking by learning background context
One challenge when tracking objects is to adapt the object representation depending on the scene context to account for changes in illumination, coloring, scaling, etc. Here, we p...
Ali Borji, Simone Frintrop, Dicky N. Sihite, Laure...
147
Voted
CVPR
2012
IEEE
13 years 4 months ago
Depth from optical turbulence
Turbulence near hot surfaces such as desert terrains and roads during the summer, causes shimmering, distortion and blurring in images. While recent works have focused on image re...
Yuandong Tian, Srinivasa G. Narasimhan, Alan J. Va...
159
Voted
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 4 months ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
120
Voted
EUROCRYPT
2012
Springer
13 years 4 months ago
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption
This paper proposes the first inner product encryption (IPE) scheme that is adaptively secure and fully attribute-hiding (attribute-hiding in the sense of the definition by Katz...
Tatsuaki Okamoto, Katsuyuki Takashima
ARGMAS
2009
Springer
15 years 8 months ago
Burden of Proof in Deliberation Dialogs
The literature in argumentation and artificial intelligence has distinguished five types of burden of proof in persuasion dialogs, but there appears to have been no serious invest...
Douglas Walton
« Prev « First page 1073 / 1210 Last » Next »