Sciweavers

162 search results - page 18 / 33
» Secure video processing: Problems and challenges
Sort
View
ICIP
2010
IEEE
14 years 9 months ago
Human action recognition using the motion of interest points
Even if the problem of human action categorization from videos has received a lot of attention during the past decade, it remains a challenging problem in operative conditions due...
Francesco Monti, Carlo S. Regazzoni
ESORICS
2011
Springer
13 years 11 months ago
Who Wrote This Code? Identifying the Authors of Program Binaries
Program authorship attribution—identifying a programmer based on stylistic characteristics of code—has practical implications for detecting software theft, digital forensics, a...
Nathan E. Rosenblum, Xiaojin Zhu, Barton P. Miller
NOSSDAV
2010
Springer
15 years 4 months ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq
IVC
2010
143views more  IVC 2010»
14 years 10 months ago
Video-based face model fitting using Adaptive Active Appearance Model
Active Appearance Model (AAM) represents the shape and appearance of an object via two low-dimensional subspaces, one for shape and one for appearance. AAM for facial images is cu...
Xiaoming Liu
84
Voted
ICIP
2010
IEEE
14 years 9 months ago
Real-time interactive multi-target tracking using kernel-based trackers
Although kernel-based methods have been demonstrated effectively in solving single-target tracking problem, facing more complicated multi-target tracking task, most of them still ...
Guorong Li, Wei Qu, Qingming Huang