Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
In this paper we present an interactive method for simulating deformable objects using skeletal constraints. We introduce a two-way coupling of a finite element model and a skelet...
Joachim Georgii, Daniel Lagler, Christian Dick, R&...
The dichromatic reflectance model introduced by Shafer [16] predicts that the colour signals of most materials fall on a plane spanned by a vector due to the material and a vector...
Relevant Component Analysis (RCA) has been proposed for learning distance metrics with contextual constraints for image retrieval. However, RCA has two important disadvantages. On...
Steven C. H. Hoi, Wei Liu, Michael R. Lyu, Wei-Yin...
We propose a convex optimization method for maximum likelihood estimation of autoregressive models, subject to conditional independence constraints. This problem is an extension t...
Jitkomut Songsiri, Joachim Dahl, Lieven Vandenberg...