Search
Now showing items 871-880 of 957
A connectionist explanation of presence in virtual environments
(2003)
Presence has various definitions, but can be understood as the sensation that a virtual environment is a real place, that the user is actually in the virtual environment rather than at the display terminal, or that the ...
Towards a general framework for Digital Rights Management (DRM)
(2007)
Digital rights management (DRM) can be defined as a technology that enables persistent access control. The common understanding of DRM is that of a technology that enables means to thwart piracy of digital multimedia through ...
A structured approach to network security protocol implementation
(2005)
The implementation of network security protocols has not received the same level of attention in the literature as their analysis. Security protocol analysis has successfully used inference logics, like GNY and BAN, and ...
Accelerating genomic sequence alignment using high performance reconfigurable computers
(2008)
Reconfigurable computing technology has progressed to a stage where it is now possible to achieve orders of magnitude performance and power efficiency gains over conventional computer architectures for a subset of high ...
A Multi-Scale Generalization of the HoG and HMAX Image Descriptors for Object Detection
(2008-04-09)
Recently, several powerful image features have been proposed whichcan be described as spatial histograms of oriented energy. Forinstance, the HoG, HMAX C1, SIFT, and Shape Context feature allrepresent an input image using ...
Trajectory Analysis and Semantic Region Modeling Using A Nonparametric Bayesian Model
(2008-06-24)
We propose a novel nonparametric Bayesian model, Dual Hierarchical Dirichlet Processes (Dual-HDP), for trajectory analysis and semantic region modeling in surveillance settings, in an unsupervised way. In our approach, ...
ZigZag Decoding: Combating Hidden Terminals in Wireless Networks
(2008-04-08)
This paper presents ZigZag, an 802.11 receiver that combats hidden terminals. ZigZag exploits 802.11 retransmissions which, in the case of hidden terminals, cause successive collisions. Due to asynchrony, these collisions ...
Two-stage Optimization Approach to Robust Model Predictive Control with a Joint Chance Constraint
(2008-03-06)
When controlling dynamic systems such as mobile robots in uncertain environments, there is a trade off between risk and reward. For example, a race car can turn a corner faster by taking a more challenging path. This paper ...
Cognitive Security for Personal Devices
(2008-03-17)
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...
LIBPMK: A Pyramid Match Toolkit
(2008-04-07)
LIBPMK is a C++ implementation of Grauman and Darrell's pyramid match algorithm. This toolkit provides a flexible framework with which developers can quickly match sets of image features and run experiments. LIBPMK provides ...