Sciweavers

14704 search results - page 2780 / 2941
» computing 2007
Sort
View
161
Voted
ICCV
2007
IEEE
16 years 5 months ago
A Scalable Approach to Activity Recognition based on Object Use
We propose an approach to activity recognition based on detecting and analyzing the sequence of objects that are being manipulated by the user. In domains such as cooking, where m...
Jianxin Wu, Adebola Osuntogun, Tanzeem Choudhury, ...
136
Voted
CCS
2007
ACM
15 years 9 months ago
Hardware-rooted trust for secure key management and transient trust
We propose minimalist new hardware additions to a microprocessor chip that protect cryptographic keys in portable computing devices which are used in the field but owned by a cen...
Jeffrey S. Dwoskin, Ruby B. Lee
148
Voted
ICCV
2007
IEEE
16 years 5 months ago
Coplanar Shadowgrams for Acquiring Visual Hulls of Intricate Objects
Acquiring 3D models of intricate objects (like tree branches, bicycles and insects) is a hard problem due to severe self-occlusions, repeated thin structures and surface discontin...
Shuntaro Yamazaki, Srinivasa G. Narasimhan, Simon ...
181
Voted
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 7 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
113
Voted
KDD
2007
ACM
132views Data Mining» more  KDD 2007»
16 years 4 months ago
LungCAD: a clinically approved, machine learning system for lung cancer detection
We present LungCAD, a computer aided diagnosis (CAD) system that employs a classification algorithm for detecting solid pulmonary nodules from CT thorax studies. We briefly descri...
R. Bharat Rao, Jinbo Bi, Glenn Fung, Marcos Salgan...
« Prev « First page 2780 / 2941 Last » Next »