Sciweavers

40 search results - page 5 / 8
» Using Visual Challenges to Verify the Integrity of Security ...
Sort
View
96
Voted
ACSC
2004
IEEE
15 years 3 months ago
Visually Sealed and Digitally Signed Documents
One of the primary flaws with current digital signature technology is that a digital signature does not "feel" or resemble a traditional seal or personal signature to th...
Vicky Liu, William J. Caelli, Ernest Foo, Selwyn R...
ICIP
2006
IEEE
16 years 1 months ago
Tracking Motion-Blurred Targets in Video
Many emerging applications require tracking targets in video. Most existing visual tracking methods do not work well when the target is motion-blurred (especially due to fast moti...
Shengyang Dai, Ming Yang, Ying Wu, Aggelos K. Kats...
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 6 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
DILS
2008
Springer
15 years 1 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
CORR
2012
Springer
230views Education» more  CORR 2012»
13 years 7 months ago
RT-SLAM: A Generic and Real-Time Visual SLAM Implementation
Abstract. This article presents a new open-source C++ implementation to solve the SLAM problem, which is focused on genericity, versatility and high execution speed. It is based on...
Cyril Roussillon, Aurélien Gonzalez, Joan S...