Sciweavers

1663 search results - page 204 / 333
» Computer Security in the Real World
Sort
View
148
Voted
WPES
2006
ACM
15 years 10 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
CVPR
2009
IEEE
16 years 11 months ago
Isometric Registration of Ambiguous and Partial Data
This paper introduces a new shape matching algorithm for computing correspondences between 3D surfaces that have undergone (approximately) isometric deformations. The new approach ...
Art Tevs (Max Planck Institute Informatik), Martin...
ICCV
2009
IEEE
16 years 9 months ago
Joint optimization of segmentation and appearance models
Many interactive image segmentation approaches use an objective function which includes appearance models as an unknown variable. Since the resulting optimization problem is NP-har...
Sara Vicente, Vladimir Kolmogorov, Carsten Rother
CVPR
2005
IEEE
16 years 6 months ago
Appearance Modeling for Tracking in Multiple Non-Overlapping Cameras
When viewed from a system of multiple cameras with nonoverlapping fields of view, the appearance of an object in one camera view is usually very different from its appearance in a...
Omar Javed, Khurram Shafique, Mubarak Shah
CVPR
2005
IEEE
16 years 6 months ago
Complex 3D Shape Recovery Using a Dual-Space Approach
This paper presents a novel method for reconstructing complex 3D objects with unknown topology using silhouettes extracted from image sequences. This method exploits the duality p...
Chen Liang, Kwan-Yee Kenneth Wong