Sciweavers

4529 search results - page 802 / 906
» Position Based Cryptography
Sort
View
DRM
2003
Springer
15 years 8 months ago
Breaking and repairing optimistic fair exchange from PODC 2003
In PODC 2003, Park, Chong, Siegel and Ray [22] proposed an optimistic protocol for fair exchange, based on RSA signatures. We show that their protocol is totally breakable already...
Yevgeniy Dodis, Leonid Reyzin
ICRA
2002
IEEE
97views Robotics» more  ICRA 2002»
15 years 8 months ago
Gripping Parts at Concave Vertices
ct A simple gripper with two vertical cylindrical jaws can make contact with external or internal concavities in polygonal and polyhedral parts to align and grip parts in form clos...
K. Gopalakrishnan 0002, Kenneth Y. Goldberg
147
Voted
SSIAI
2002
IEEE
15 years 8 months ago
Active Contours for Cell Tracking
This paper introduces an active contour or snakebased method for tracking cells within a video sequence. Specifically, we apply our cell tracking techniques to rolling leukocytes ...
Nilanjan Ray, Scott T. Acton
166
Voted
CIVR
2010
Springer
276views Image Analysis» more  CIVR 2010»
15 years 7 months ago
Optimizing visual search with implicit user feedback in interactive video retrieval
This paper describes an approach to optimize query by visual example results, by combining visual features and implicit user feedback in interactive video retrieval. To this end, ...
Stefanos Vrochidis, Ioannis Kompatsiaris, Ioannis ...
COMPSAC
2009
IEEE
15 years 7 months ago
Tool Support for Design Pattern Recognition at Model Level
Given the rapid rise of model-driven software development methodologies, it is highly desirable that tools be developed to support the use of design patterns in this context. This...
Hong Zhu, Ian Bayley, Lijun Shan, Richard Amphlett