Sciweavers

1361 search results - page 176 / 273
» Spaces of practice
Sort
View
PERCOM
2007
ACM
15 years 11 months ago
Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems
The objective of private authentication for Radio Frequency Identification (RFID) systems is to allow valid readers to explicitly authenticate their dominated tags without leaking...
Li Lu, Jinsong Han, Lei Hu, Yunhao Liu, Lionel M. ...
87
Voted
CVPR
2009
IEEE
15 years 9 months ago
Recognizing human group activities with localized causalities
The aim of this paper is to address the problem of recognizing human group activities in surveillance videos. This task has great potentials in practice, however was rarely studie...
Ashraf A. Kassim, Bingbing Ni, Shuicheng Yan
ALT
2003
Springer
15 years 8 months ago
Kernel Trick Embedded Gaussian Mixture Model
In this paper, we present a kernel trick embedded Gaussian Mixture Model (GMM), called kernel GMM. The basic idea is to embed kernel trick into EM algorithm and deduce a parameter ...
Jingdong Wang, Jianguo Lee, Changshui Zhang
ICCAD
2002
IEEE
143views Hardware» more  ICCAD 2002»
15 years 8 months ago
A Markov chain sequence generator for power macromodeling
In macromodeling-based power estimation, circuit macromodels are created from simulations of synthetic input vector sequences. Fast generation of these sequences with all possible...
Xun Liu, Marios C. Papaefthymiou
HICSS
2010
IEEE
187views Biometrics» more  HICSS 2010»
15 years 6 months ago
Engaging the Periphery for Visual Communication on Mobile Phones
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...