Sciweavers

6300 search results - page 1035 / 1260
» We have it easy, but do we have it right
Sort
View
INFOCOM
2011
IEEE
14 years 5 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ICCV
2011
IEEE
14 years 1 months ago
Multiview 3D Warps
Image registration and 3D reconstruction are fundamental computer vision and medical imaging problems. They are particularly challenging when the input data are images of a deform...
Alessio Del Bue, Adrien Bartoli
ISCA
2012
IEEE
242views Hardware» more  ISCA 2012»
13 years 4 months ago
Side-channel vulnerability factor: A metric for measuring information leakage
There have been many attacks that exploit side-effects of program execution to expose secret information and many proposed countermeasures to protect against these attacks. Howeve...
John Demme, Robert Martin, Adam Waksman, Simha Set...
CVPR
2000
IEEE
16 years 3 months ago
Dynamic Layer Representation with Applications to Tracking
A dynamic layer representation is proposed in this paper for tracking moving objects. Previous work on layered representations has largely concentrated on two-/multiframe batch fo...
Hai Tao, Harpreet S. Sawhney, Rakesh Kumar
ECCV
2008
Springer
16 years 3 months ago
Understanding Camera Trade-Offs through a Bayesian Analysis of Light Field Projections
Computer vision has traditionally focused on extracting structure, such as depth, from images acquired using thin-lens or pinhole optics. The development of computational imaging i...
Anat Levin, William T. Freeman, Frédo Duran...
« Prev « First page 1035 / 1260 Last » Next »