Sciweavers

1083 search results - page 48 / 217
» The limits of localization using RSS
Sort
View
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
ICNP
2002
IEEE
15 years 2 months ago
Routing Bandwidth Guaranteed Paths with Local Restoration in Label Switched Networks
The emerging Multi-Protocol Label Switching (MPLS) networks enable network service providers to route bandwidth guaranteed paths between customer sites [3, 2, 8, 5]. This basic La...
Erran L. Li, Milind M. Buddhikot, Chandra Chekuri,...
ICIP
2005
IEEE
15 years 11 months ago
Static human body postures recognition in video sequences using the belief theory
This paper presents a system that can automatically recognize four different static human body postures in video sequences. The considered postures are standing, sitting, squattin...
Alice Caplier, Laurent Bonnaud, Michèle Rom...
MICCAI
2005
Springer
15 years 10 months ago
Multiscale 3D Shape Analysis Using Spherical Wavelets
Shape priors attempt to represent biological variations within a population. When variations are global, Principal Component Analysis (PCA) can be used to learn major modes of vari...
Delphine Nain, Steven Haker, Aaron F. Bobick, Alle...
MICCAI
2004
Springer
15 years 10 months ago
Border Detection on Short Axis Echocardiographic Views Using a Region Based Ellipse-Driven Framework
In this paper, we propose a robust technique that integrates spatial and temporal information for consistent recovery of the endocardium. To account for the low image quality we in...
Maxime Taron, Nikos Paragios, Marie-Pierre Jolly