Sciweavers

181 search results - page 32 / 37
» Social Event Extraction: Task, Challenges and Techniques
Sort
View
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
15 years 5 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
EWCBR
2004
Springer
15 years 4 months ago
Textual Reuse for Email Response
The case-based reasoning approach to email response consists of reusing past messages to synthesize new responses to incoming requests. This task presents various challenges due to...
Luc Lamontagne, Guy Lapalme
ICFEM
2007
Springer
15 years 2 months ago
Automating Refinement Checking in Probabilistic System Design
Abstract. Refinement plays a crucial role in "top-down" styles of verification, such as the refinement calculus, but for probabilistic systems proof of refinement is a pa...
Carlos Gonzalia, Annabelle McIver
ACCV
2010
Springer
14 years 6 months ago
Spatiotemporal Closure
Spatiotemporal segmentation is an essential task for video analysis. The strong interconnection between finding an object's spatial support and finding its motion characterist...
Alex Levinshtein, Cristian Sminchisescu, Sven J. D...
TSP
2010
14 years 5 months ago
Localization in underwater dispersive channels using the time-frequency-phase continuity of signals
Time-frequency representations constitute the main tool for analysis of nonstationary signals arising in real-life systems. One of the most challenging applications of time-frequen...
Cornel Ioana, Arnaud Jarrot, Cedric Gervaise, Yann...