Sciweavers

1585 search results - page 187 / 317
» Automatically optimizing secure computation
Sort
View
TON
2002
144views more  TON 2002»
13 years 7 months ago
Algorithms for provisioning virtual private networks in the hose model
Virtual Private Networks (VPNs) provide customers with predictable and secure network connections over a shared network. The recently proposed hose model for VPNs allows for great...
Amit Kumar, Rajeev Rastogi, Abraham Silberschatz, ...
ICCV
2009
IEEE
15 years 1 months ago
Unsupervised Face Alignment by Robust Nonrigid Mapping
We propose a novel approach to unsupervised facial image alignment. Differently from previous approaches, that are confined to affine transformations on either the entire face o...
Jianke Zhu, Luc Van Gool and Steven C. H. Hoi
ICPR
2008
IEEE
14 years 9 months ago
Training sequential on-line boosting classifier for visual tracking
On-line boosting allows to adapt a trained classifier to changing environmental conditions or to use sequentially available training data. Yet, two important problems in the on-li...
Helmut Grabner, Horst Bischof, Jan Sochman, Jiri M...
ICPR
2006
IEEE
14 years 9 months ago
Modelling Crowd Scenes for Event Detection
This work presents an automatic technique for detection of abnormal events in crowds. Crowd behaviour is difficult to predict and might not be easily semantically translated. More...
Ernesto L. Andrade, Robert B. Fisher, Scott Blunsd...
ICPR
2004
IEEE
14 years 9 months ago
Gaussian Energy Functions for Registration without Correspondences
A new criterion based on Gaussian fields is introduced and applied to the task of automatic rigid registration of point-sets. The method defines a simple energy function, which is...
Andreas Koschan, Besma R. Abidi, Faysal Boughorbel...