Sciweavers

1801 search results - page 148 / 361
» Pointing without a pointer
Sort
View
WACV
2008
IEEE
15 years 5 months ago
Segmentation of Salient Regions in Outdoor Scenes Using Imagery and 3-D Data
This paper describes a segmentation method for extracting salient regions in outdoor scenes using both 3-D laser scans and imagery information. Our approach is a bottomup attentiv...
Gunhee Kim, Daniel F. Huber, Martial Hebert
ACISP
2008
Springer
15 years 5 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
100
Voted
IEEEIAS
2007
IEEE
15 years 5 months ago
Metrics-based Evaluation of Slicing Obfuscations
An obfuscation aims to transform a program, without affecting its functionality, so that some secret data within the program can be hidden for as long as possible from an adversar...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
15 years 5 months ago
Handling shape and contact location uncertainty in grasping two-dimensional planar objects
— This paper addresses the problem of selecting contact locations for grasping objects in the presence of shape and contact location uncertainty. Focusing on two-dimensional plan...
Vassilios N. Christopoulos, Paul R. Schrater
132
Voted
ECUMN
2007
Springer
15 years 5 months ago
Context-Sensitive Security Framework for Pervasive Environments
Pervasive systems enable us to have an overview of what digital environments will look like in the future. Opportunities given by pervasive systems, both in terms of applications ...
Charles-Eric Pigeot, Yann Gripay, Vasile-Marian Sc...