Sciweavers

232 search results - page 40 / 47
» Competitiveness via consensus
Sort
View
CVPR
2011
IEEE
13 years 4 months ago
Object Segmentation by Alignment of Poselet Activations to Image Contours
In this paper, we propose techniques to make use of two complementary bottom-up features, image edges and texture patches, to guide top-down object segmentation towards higher pre...
Thomas Brox, Lubomir Bourdev, Subhransu Maji, Jite...
FSE
2011
Springer
264views Cryptology» more  FSE 2011»
12 years 11 months ago
An Improved Algebraic Attack on Hamsi-256
Hamsi is one of the 14 second-stage candidates in NIST’s SHA-3 competition. The only previous attack on this hash function was a very marginal attack on its 256-bit version publi...
Itai Dinur, Adi Shamir
ICCV
2011
IEEE
12 years 7 months ago
The Truth about Cats and Dogs
Template-based object detectors such as the deformable parts model of Felzenszwalb et al. [11] achieve state-ofthe-art performance for a variety of object categories, but are stil...
Omkar M Parkhi, Andrea Vedaldi, C. V. Jawahar, And...

Lab
667views
14 years 4 months ago
Digital Systems and Media Computing Laboratory - DSMC
The Digital Systems and Media Computing Laboratory (DSMC Lab) was established in the end of 2002 and is located in Patras, Greece. DSMC operates under the School of Sciences and Te...
WWW
2010
ACM
14 years 2 months ago
Expressive auctions for externalities in online advertising
When online ads are shown together, they compete for user attention and conversions, imposing negative externalities on each other. While the competition for user attention in spo...
Arpita Ghosh, Amin Sayedi