Sciweavers

2327 search results - page 235 / 466
» Secure Image Filtering
Sort
View
ICRA
2010
IEEE
158views Robotics» more  ICRA 2010»
14 years 9 months ago
Real-time monocular SLAM: Why filter?
Abstract— While the most accurate solution to off-line structure from motion (SFM) problems is undoubtedly to extract as much correspondence information as possible and perform g...
Hauke Strasdat, J. M. M. Montiel, Andrew J. Daviso...
93
Voted
ACMSE
2009
ACM
15 years 5 months ago
Bit vector algorithms enabling high-speed and memory-efficient firewall blacklisting
In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
J. Lane Thames, Randal Abler, David Keeling
IICAI
2003
15 years 14 days ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
75
Voted
ICIP
2008
IEEE
15 years 5 months ago
On the security of non-forgeable robust hash functions
In many applications, it is often desirable to extract a consistent key from a multimedia object (e.g., an image), even when the object has gone through a noisy channel. For examp...
Qiming Li, Sujoy Roy
88
Voted
ICIP
2006
IEEE
16 years 23 days ago
On Performance Comparison of Real and Synthetic Iris Images
In the absence of real data for extensive testing of newly designed large-scale biometrics recognition systems a number of solutions are possible including use of resampling metho...
Jinyu Zuo, Natalia A. Schmid, Xiaohan Chen