Sciweavers

348 search results - page 37 / 70
» Offline firewall analysis
Sort
View
ICCV
2009
IEEE
1052views Computer Vision» more  ICCV 2009»
16 years 4 months ago
A direct approach for efficiently tracking with 3D Morphable Models
We present an efficient algorithm for fitting a morphable model to an image sequence. It is built on a projective geometry formulation of perspective projection, which results in a...
Enrique Muñoz, José M. Buenaposada, Luis Baumela
SODA
2010
ACM
187views Algorithms» more  SODA 2010»
15 years 9 months ago
An Improved Competitive Algorithm for Reordering Buffer Management
We design and analyze an on-line reordering buffer management algorithm with improved O log k log log k competitive ratio for non-uniform costs, where k is the buffer size. This i...
Noa Avigdor-Elgrabli, Yuval Rabani
IEEEARES
2009
IEEE
15 years 6 months ago
Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests
—The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be...
Marcelo Masera, Igor Nai Fovino
CISIM
2007
IEEE
15 years 6 months ago
The Compact Three Stages Method of the Signature Recognition
In this paper the off–line type signature analyses have been considered. Signature image by means of three different approaches is analysed, what allows to define features (weigh...
Piotr Porwik
AVSS
2006
IEEE
15 years 5 months ago
An LMI Approach for Reliable PTZ Camera Self-Calibration
PTZ (Pan-Tilt-Zoom) cameras are widely used for large-area video surveillance. For many visual tracking and video analysis tasks, an accurate camera calibration is very important....
Hongdong Li, Chunhua Shen