Sciweavers

601 search results - page 94 / 121
» Verifiable Network-Performance Measurements
Sort
View
141
Voted
RAS
2000
161views more  RAS 2000»
15 years 3 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
130
Voted
TASLP
2002
79views more  TASLP 2002»
15 years 3 months ago
Perception-based partial encryption of compressed speech
Mobile multimedia applications, the focus of many forthcoming wireless services, increasingly demand low-power techniques implementing content protection and customer privacy. In t...
Antonio Servetti, Juan Carlos De Martin
146
Voted
CIVR
2010
Springer
235views Image Analysis» more  CIVR 2010»
15 years 2 months ago
Dynamic textures for human movement recognition
Human motion can be seen as a type of texture pattern. In this paper, we adopt the ideas of spatiotemporal analysis and the use of local features for motion description. movements...
Vili Kellokumpu, Guoying Zhao, Matti Pietikäi...
117
Voted
ACSAC
2010
IEEE
15 years 1 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
145
Voted
IDEAL
2010
Springer
15 years 1 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...