Sciweavers

1585 search results - page 211 / 317
» Automatically optimizing secure computation
Sort
View
GRAPHICSINTERFACE
2009
13 years 6 months ago
Sketch-based path design
We present Drive, a system for the conceptual layout of 3D path networks. Our sketch-based interface allows users to efficiently author path layouts with minimal instruction. Our ...
James McCrae, Karan Singh
CVPR
2011
IEEE
13 years 4 months ago
Scenario-Based Video Event Recognition by Constraint Flow
We present a novel approach to representing and recognizing composite video events. A composite event is specified by a scenario, which is based on primitive events and their tem...
Suha Kwak, Bohyung Han, Joon Han
ACCV
2010
Springer
13 years 3 months ago
An Unsupervised Framework for Action Recognition Using Actemes
Abstract. In speech recognition, phonemes have demonstrated their efficacy to model the words of a language. While they are well defined for languages, their extension to human act...
Kaustubh Kulkarni, Edmond Boyer, Radu Horaud, Amit...
ICCV
2011
IEEE
12 years 8 months ago
Active Geodesics: Region based Active Contour Segmentation with a Global Edge based Constraint
We present an active geodesic contour model in which we constrain the evolving active contour to be a geodesic with respect to a weighted edge-based energy through its entire evol...
Vikram Appia, Anthony Yezzi
HPCC
2011
Springer
12 years 8 months ago
Heuristic-Based Techniques for Mapping Irregular Communication Graphs to Mesh Topologies
— Mapping of parallel applications on the network topology is becoming increasingly important on large supercomputers. Topology aware mapping can reduce the hops traveled by mess...
Abhinav Bhatele, Laxmikant V. Kalé