We study the challenging problem of localizing and classifying category-specific object contours in real world images. For this purpose, we present a simple yet effective method ...
Bharath Hariharan, Pablo Arbelaez, Lubomir Bourdev...
Abstract People typically move and act under the constraints of an environment, making human behavior strongly place-dependent. Motion patterns, the places and the rates at which p...
Matthias Luber, Gian Diego Tipaldi, Kai Oliver Arr...
This paper describes the participation of UAIC team at the LogCLEF 2011 initiative, language identification task. Our approach is an aggregation of known methods for recognizing la...
The McEliece cryptosystem is one of the few systems to be considered secure against attacks by Quantum computers. The original scheme is built upon Goppa codes and produces very l...
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...