Sciweavers

3108 search results - page 163 / 622
» The Elements of Computer Credibility
Sort
View
IJCV
1998
103views more  IJCV 1998»
15 years 4 months ago
Dense Non-Rigid Motion Estimation in Sequences of Medical Images Using Differential Constraints
We describe a new method for computing the displacement vector field in time sequences of 2D or 3D images (4D data). The method is energy-minimizing on the space of correspondence...
Serge Benayoun, Nicholas Ayache
189
Voted
HCI
2009
15 years 2 months ago
Behavior-Sensitive User Interfaces for Smart Environments
In smart environments interactive assistants can support the user's daily life by being ubiquitously available through any interaction device that is connected to the network....
Veit Schwartze, Sebastian Feuerstack, Sahin Albayr...
88
Voted
HCI
2009
15 years 2 months ago
Use Cases Functionality of the OASIS HCI
Abstract. Within OASIS, a set of detailed Use Cases have been developed, after capturing the specific needs of elderly users on the use and acquisition of services for the support ...
Maria Panou, Evangelos Bekiaris, Maria Fernanda Ca...
TCS
2011
14 years 12 months ago
Algebraic aspects of some Riordan arrays related to binary words avoiding a pattern
We consider some Riordan arrays related to binary words avoiding a pattern p, which can be easily studied by means of an A-matrix rather than their A-sequence. Both concepts allow...
Donatella Merlini, Renzo Sprugnoli
BIRTHDAY
2012
Springer
14 years 22 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...