Sciweavers

313 search results - page 39 / 63
» Building Credible Input Models
Sort
View
TOG
2010
64views more  TOG 2010»
13 years 2 months ago
K-set tilable surfaces
This paper introduces a method for optimizing the tiles of a quadmesh. Given a quad-based surface, the goal is to generate a set of K quads whose instances can produce a tiled sur...
Chi-Wing Fu, Chi-Fu Lai, Ying He 0001, Daniel Cohe...
CVPR
2009
IEEE
15 years 2 months ago
Automatic Reconstruction of Cities from Remote Sensor Data
In this paper, we address the complex problem of rapid modeling of large-scale areas and present a novel approach for the automatic reconstruction of cities from remote sensor da...
Charalambos Poullis (CGIT/IMSC/USC), Suya You (Uni...
ICPR
2006
IEEE
14 years 8 months ago
MONNET: Monitoring Pedestrians with a Network of Loosely-Coupled Cameras
MONNET is a visual surveillance system for tracking pedestrians over extended premises. The MONNET system is composed of intelligent nodes, which exchange information on the indiv...
Alexandra Branzan Albu, André Zaccarin, Den...
WSDM
2010
ACM
254views Data Mining» more  WSDM 2010»
14 years 4 months ago
Learning Influence Probabilities In Social Networks
Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a ...
Amit Goyal 0002, Francesco Bonchi, Laks V. S. Laks...
ISSADS
2005
Springer
14 years 1 months ago
On the Role of Information Compaction to Intrusion Detection
An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
Fernando Godínez, Dieter Hutter, Raul Monro...