Sciweavers

1585 search results - page 142 / 317
» Automatically optimizing secure computation
Sort
View
ICPR
2006
IEEE
14 years 9 months ago
Simultaneous Image Denoising and Compression by Multiscale 2D Tensor Voting
In this paper we propose a method that simultaneously performs image denoising and compression by using multiscale tensor voting. Given a real color image, the pixels are first co...
Yu-Wing Tai, Wai-Shun Tong, Chi-Keung Tang
DAC
2000
ACM
14 years 9 months ago
Dynamic power management of complex systems using generalized stochastic Petri nets
In this paper, we introduce a new technique for modeling and solving the dynamic power management (DPM) problem for systems with complex behavioral characteristics such as concurr...
Qinru Qiu, Qing Wu, Massoud Pedram
ICPR
2008
IEEE
14 years 2 months ago
Graph cut based deformable model with statistical shape priors
This paper presents a novel graph cut based segmentation approach with shape priors. The model incorporates statistical shape prior information with the active contour without edg...
Noha Youssry El-Zehiry, Adel Elmaghraby
ACMDIS
2010
ACM
13 years 8 months ago
LumiBots: making emergence graspable in a swarm of robots
Emergence is a concept that is not easy to grasp, since it contradicts our idea of central control and planning. In this work, we use a swarm of robots as a tangible tool to visua...
Mey Lean Kronemann, Verena Vanessa Hafner
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...