Sciweavers

14967 search results - page 2895 / 2994
» Visualizing the visual system
Sort
View
119
Voted
ACNS
2009
Springer
142views Cryptology» more  ACNS 2009»
15 years 7 months ago
Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior
Abstract. “Secure Device Pairing” is the process of bootstrapping secure communication between two devices over a short- or medium-range wireless channel (such as Bluetooth, Wi...
Nitesh Saxena, Md. Borhan Uddin
CANS
2009
Springer
152views Cryptology» more  CANS 2009»
15 years 7 months ago
On the Usability of Secure Association of Wireless Devices Based on Distance Bounding
When users wish to establish wireless communication between their devices, the channel needs to be bootstrapped first. Usually, the channel is desired to be authenticated and con...
Mario Cagalj, Nitesh Saxena, Ersin Uzun
97
Voted
CIKM
2009
Springer
15 years 7 months ago
Reducing the risk of query expansion via robust constrained optimization
We introduce a new theoretical derivation, evaluation methods, and extensive empirical analysis for an automatic query expansion framework in which model estimation is cast as a r...
Kevyn Collins-Thompson
125
Voted
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 7 months ago
Video copy detection by fast sequence matching
Sequence matching techniques are effective for comparing two videos. However, existing approaches suffer from demanding computational costs and thus are not scalable for large-sca...
Mei-Chen Yeh, Kwang-Ting Cheng
119
Voted
ISCIS
2009
Springer
15 years 7 months ago
Unsupervised learning of affordance relations on a humanoid robot
—In this paper, we study how a humanoid robot can learn affordance relations in his environment through its own interactions in an unsupervised way. Specifically, we developed a...
Baris Akgun, Nilgun Dag, Tahir Bilal, Ilkay Atil, ...
« Prev « First page 2895 / 2994 Last » Next »