Sciweavers

3608 search results - page 174 / 722
» computer 2011
Sort
View
ICCV
2011
IEEE
14 years 3 months ago
Semantic Contours from Inverse Detectors
We study the challenging problem of localizing and classifying category-specific object contours in real world images. For this purpose, we present a simple yet effective method ...
Bharath Hariharan, Pablo Arbelaez, Lubomir Bourdev...
174
Voted
IJRR
2011
226views more  IJRR 2011»
14 years 10 months ago
Place-dependent people tracking
Abstract People typically move and act under the constraints of an environment, making human behavior strongly place-dependent. Motion patterns, the places and the rates at which p...
Matthias Luber, Gian Diego Tipaldi, Kai Oliver Arr...
CLEF
2011
Springer
14 years 3 months ago
Adapting Statistical Language Identification Methods for Short Queries
This paper describes the participation of UAIC team at the LogCLEF 2011 initiative, language identification task. Our approach is an aggregation of known methods for recognizing la...
Alexandru-Lucian Gînsca, Emanuela Boros, Adr...
IACR
2011
133views more  IACR 2011»
14 years 3 months ago
Compact McEliece keys based on Quasi-Dyadic Srivastava codes
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Edoardo Persichetti
IACR
2011
116views more  IACR 2011»
14 years 3 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev