Sciweavers

3771 search results - page 265 / 755
» Subobject Transformation Systems
Sort
View
ICASSP
2010
IEEE
15 years 2 months ago
Sectored Random Projections for Cancelable Iris Biometrics
Privacy and security are essential requirements in practical biometric systems. In order to prevent the theft of biometric patterns, it is desired to modify them through revocable...
Jaishanker K. Pillai, Vishal M. Patel, Rama Chella...
158
Voted
PAMI
2011
14 years 11 months ago
Robust Bilayer Segmentation and Motion/Depth Estimation with a Handheld Camera
—Extracting high-quality dynamic foreground layers from a video sequence is a challenging problem due to the coupling of color, motion, and occlusion. Many approaches assume that...
Guofeng Zhang, Jiaya Jia, Wei Hua, Hujun Bao
ICRA
2007
IEEE
138views Robotics» more  ICRA 2007»
15 years 10 months ago
Managing non-determinism in symbolic robot motion planning and control
Abstract— We study the problem of designing control strategies for nondeterministic transitions systems enforcing the satisfaction of Linear Temporal Logic (LTL) formulas over th...
Marius Kloetzer, Calin Belta
IWSEC
2009
Springer
15 years 10 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
ICIP
2008
IEEE
15 years 10 months ago
H.264/AVC video scrambling for privacy protection
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding....
Frédéric Dufaux, Touradj Ebrahimi