Sciweavers

773 search results - page 113 / 155
» On Cryptographic Assumptions and Challenges
Sort
View
CVPR
2006
IEEE
15 years 8 months ago
Combined Depth and Outlier Estimation in Multi-View Stereo
In this paper, we present a generative model based approach to solve the multi-view stereo problem. The input images are considered to be generated by either one of two processes:...
Christoph Strecha, Rik Fransens, Luc J. Van Gool
ICMCS
2006
IEEE
125views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Label Disambiguation and Sequence Modeling for Identifying Human Activities from Wearable Physiological Sensors
Wearable physiological sensors can provide a faithful record of a patient’s physiological states without constant attention of caregivers. A computer program that can infer huma...
Wei-Hao Lin, Alexander G. Hauptmann
IPCCC
2006
IEEE
15 years 8 months ago
A framework for distributed key management schemes in heterogeneous wireless sensor networks
— Key management is a major challenge in the design and deployment of secure wireless sensor networks. A common assumption in most distributed key management schemes is that all ...
Kejie Lu, Yi Qian, Jiankun Hu
NCA
2006
IEEE
15 years 8 months ago
Parallelization of Geant4 Using TOP-C and Marshalgen
Geant4 is a very large, highly accurate toolkit for Monte Carlo simulation of particle-matter interaction. It has been applied to high-energy physics, cosmic ray modeling, radiati...
Gene Cooperman, Viet Ha Nguyen, Igor Malioutov
106
Voted
ACMICEC
2006
ACM
157views ECommerce» more  ACMICEC 2006»
15 years 8 months ago
Adaptive mechanism design: a metalearning approach
Auction mechanism design has traditionally been a largely analytic process, relying on assumptions such as fully rational bidders. In practice, however, bidders often exhibit unkn...
David Pardoe, Peter Stone, Maytal Saar-Tsechansky,...