Sciweavers

4965 search results - page 964 / 993
» A Simple Abstraction for Data Modeling
Sort
View
179
Voted
USS
2010
15 years 1 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
15 years 1 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
CVPR
2008
IEEE
16 years 5 months ago
Learning class-specific affinities for image labelling
Spectral clustering and eigenvector-based methods have become increasingly popular in segmentation and recognition. Although the choice of the pairwise similarity metric (or affin...
Dhruv Batra, Rahul Sukthankar, Tsuhan Chen
150
Voted
CVPR
2011
IEEE
15 years 10 days ago
Natural Image Denoising: Optimality and Inherent Bounds
The goal of natural image denoising is to estimate a clean version of a given noisy image, utilizing prior knowledge on the statistics of natural images. The problem has been stud...
Anat Levin, Boaz Nadler
CVPR
2011
IEEE
14 years 11 months ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang