Sciweavers

371 search results - page 48 / 75
» Template Based Semantic Similarity for Security Applications
Sort
View
CORR
2010
Springer
84views Education» more  CORR 2010»
14 years 9 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CVIU
2011
14 years 1 months ago
Markerless reconstruction and synthesis of dynamic facial expressions
In this paper we combine methods from the field of computer vision with surface editing techniques to generate animated faces, which are all in full correspondence to each other....
Dominik Sibbing, Martin Habbecke, Leif Kobbelt
TCSV
2002
134views more  TCSV 2002»
14 years 9 months ago
Factor graph framework for semantic video indexing
Video query by semantic keywords is one of the most challenging research issues in video data management. To go beyond low-level similarity and access video data content by semanti...
Milind R. Naphade, Igor Kozintsev, Thomas S. Huang
ETRICS
2006
15 years 1 months ago
Simplifying Signature Engineering by Reuse
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
GEOS
2009
Springer
15 years 2 months ago
Towards Reasoning Pragmatics
Abstract. The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenge...
Pascal Hitzler