Sciweavers

2088 search results - page 165 / 418
» The Probabilistic Method
Sort
View
137
Voted
MOBISYS
2006
ACM
16 years 2 months ago
LIGER: implementing efficient hybrid security mechanisms for heterogeneous sensor networks
The majority of security schemes available for sensor networks assume deployment in areas without access to a wired infrastructure. More specifically, nodes in these networks are ...
Patrick Traynor, Raju Kumar, Hussain Bin Saad, Guo...
CVPR
2001
IEEE
16 years 5 months ago
3D Object Recognition from Range Images using Local Feature Histograms
This paper explores a view-based approach to recognize free-form objects in range images. We are using a set of local features that are easy to calculate and robust to partial occ...
Bastian Leibe, Bernt Schiele, Günter Hetzel, ...
104
Voted
MICCAI
2005
Springer
16 years 4 months ago
An Automated Approach to Connectivity-Based Partitioning of Brain Structures
Abstract. We present an automated approach to the problem of connectivity-based partitioning of brain structures using diffusion imaging. White-matter fibres connect different area...
Philip A. Cook, Hui Zhang 0005, Brian B. Avants, P...
SP
2006
IEEE
147views Security Privacy» more  SP 2006»
15 years 9 months ago
A Computationally Sound Mechanized Prover for Security Protocols
We present a new mechanized prover for secrecy properties of security protocols. In contrast to most previous provers, our tool does not rely on the Dolev-Yao model, but on the co...
Bruno Blanchet
AAAI
1994
15 years 4 months ago
Applying VC-Dimension Analysis To 3D Object Recognition from Perspective Projections
We analyze the amount of information needed to carry out model-based recognition tasks, in the context of a probabilistic data collection model, and independently of the recogniti...
Michael Lindenbaum, Shai Ben-David