Sciweavers

1585 search results - page 191 / 317
» Automatically optimizing secure computation
Sort
View
CVPR
2011
IEEE
12 years 12 months ago
Earth Mover’s Prototypes: a Convex Learning Approach for Discovering Activity Patterns in Dynamic Scenes
We present a novel approach for automatically discovering spatio-temporal patterns in complex dynamic scenes. Similarly to recent non-object centric methods, we use low level visu...
Elisa Ricci, Gloria Zen
ICCV
2011
IEEE
12 years 8 months ago
Simultaneous Multi-Body Stereo and Segmentation
This paper presents a novel multi-body multi-view stereo method to simultaneously recover dense depth maps and perform segmentation with the input of a monocular image sequence. U...
Guofeng Zhang, Jiaya Jia, Hujun Bao

Book
688views
15 years 6 months ago
Database Management Systems
A set of presentations covering the book, which includes the following topics ER Model and Conceptual Design, The Relational Model and SQL DDL, Relational Algebra, SQL, Database Ap...
Raghu Ramakrishnan, Johannes Gehrke
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 8 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 2 months ago
Maximization of Network Survival Time in the Event of Intelligent and Malicious Attacks
—It is not possible to ensure that a network is absolutely secure. Therefore, network operators must continually change their defense strategies to counter attackers who constant...
Po-Hao Tsang, Frank Yeong-Sung Lin, Chun-Wei Chen