Sciweavers

1663 search results - page 131 / 333
» Computer Security in the Real World
Sort
View
164
Voted
CVPR
2004
IEEE
16 years 5 months ago
Restoration of Curved Document Images through 3D Shape Modeling
In this paper, we address the problem of discovering the 3D shape of a book surface from the shading information in a scanned document image. This shapefrom-shading problem is cha...
Zheng Zhang 0003, Chew Lim Tan, Liying Fan
155
Voted
ECCV
2002
Springer
16 years 5 months ago
Audio-Video Sensor Fusion with Probabilistic Graphical Models
Abstract. We present a new approach to modeling and processing multimedia data. This approach is based on graphical models that combine audio and video variables. We demonstrate it...
Matthew J. Beal, Hagai Attias, Nebojsa Jojic
167
Voted
OSDI
2004
ACM
16 years 4 months ago
MapReduce: Simplified Data Processing on Large Clusters
MapReduce is a programming model and an associated implementation for processing and generating large data sets. Users specify a map function that processes a key/value pair to ge...
Jeffrey Dean, Sanjay Ghemawat
150
Voted
ICCV
2011
IEEE
14 years 3 months ago
Realtime Multibody Visual SLAM with a Smoothly Moving Monocular Camera
This paper presents a realtime, incremental multibody visual SLAM system that allows choosing between full 3D reconstruction or simply tracking of the moving objects. Motion recon...
Abhijit Kundu, Madhava Krishna, C. V. Jawahar
217
Voted
ICDCS
2005
IEEE
15 years 9 months ago
Filter Based Directory Replication: Algorithms and Performance
Directories have become an important component of the enterprise security and identity management middleware. This paper describes a novel filter based replication model for Light...
Apurva Kumar