Sciweavers

601 search results - page 94 / 121
» Verifiable Network-Performance Measurements
Sort
View
RAS
2000
161views more  RAS 2000»
14 years 10 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
TASLP
2002
79views more  TASLP 2002»
14 years 9 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin
93
Voted
CIVR
2010
Springer
235views Image Analysis» more  CIVR 2010»
14 years 8 months ago
Dynamic textures for human movement recognition
Human motion can be seen as a type of texture pattern. In this paper, we adopt the ideas of spatiotemporal analysis and the use of local features for motion description. movements...
Vili Kellokumpu, Guoying Zhao, Matti Pietikäi...
78
Voted
ACSAC
2010
IEEE
14 years 8 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
IDEAL
2010
Springer
14 years 8 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...