Sciweavers

5722 search results - page 379 / 1145
» Security Function Interactions
Sort
View
ISW
2009
Springer
15 years 10 months ago
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as ...
Mario Lamberger, Florian Mendel
CVPR
2004
IEEE
16 years 6 months ago
Globally Optimal Segmentation of Interacting Surfaces with Geometric Constraints
Abstract-- Efficient detection of globally optimal surfaces representing object boundaries in volumetric datasets is important and remains challenging in many medical image analysi...
Kang Li, Xiaodong Wu, Danny Z. Chen, Milan Sonka
CVPR
2010
IEEE
16 years 9 days ago
Nonparametric Higher-Order Learning for Interactive Segmentation
In this paper, we deal with a generative model for multi-label, interactive segmentation. To estimate the pixel likelihoods for each label, we propose a new higher-order formulatio...
Tae Hoon Kim (Seoul National University), Kyoung M...
145
Voted
ICRA
2009
IEEE
142views Robotics» more  ICRA 2009»
15 years 10 months ago
Pose estimation and adaptive robot behaviour for human-robot interaction
— This paper introduces a new method to determine a person’s pose based on laser range measurements. Such estimates are typically a prerequisite for any human-aware robot navig...
Mikael Svenstrup, Søren Tranberg Hansen, Ha...
130
Voted
MHCI
2009
Springer
15 years 10 months ago
Using handheld devices for mobile interaction with displays in home environments
An increasing number of households are equipped with a large number of TV sets and more and more of them are large highresolution displays. Furthermore, we see the integration of ...
Andreas Lorenz, Clara Fernandez De Castro, Enrico ...