Sciweavers

988 search results - page 30 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
MICRO
2008
IEEE
118views Hardware» more  MICRO 2008»
15 years 4 months ago
Notary: Hardware techniques to enhance signatures
Hardware signatures have been recently proposed as an efficient mechanism to detect conflicts amongst concurrently running transactions in transactional memory systems (e.g., Bulk...
Luke Yen, Stark C. Draper, Mark D. Hill
73
Voted
ICCV
2007
IEEE
15 years 11 months ago
Human Pose Estimation using Motion Exemplars
We present a motion exemplar approach for finding body configuration in monocular videos. A motion correlation technique is employed to measure the motion similarity at various sp...
Alireza Fathi, Greg Mori
102
Voted
ICMCS
2005
IEEE
177views Multimedia» more  ICMCS 2005»
15 years 3 months ago
Comparison of Visual Features and Fusion Techniques in Automatic Detection of Concepts from News Video
This study describes experiments on automatic detection of semantic concepts, which are textual descriptions about the digital video content. The concepts can be further used in c...
Mika Rautiainen, Tapio Seppänen
77
Voted
TCC
2009
Springer
117views Cryptology» more  TCC 2009»
15 years 10 months ago
Towards a Theory of Extractable Functions
Extractable functions are functions where any adversary that outputs a point in the range of the function is guaranteed to "know" a corresponding preimage. Here, knowledg...
Ran Canetti, Ronny Ramzi Dakdouk
CCS
2007
ACM
15 years 1 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...