Sciweavers

2725 search results - page 491 / 545
» Constraint Solving for Interpolation
Sort
View
JOTA
2011
78views more  JOTA 2011»
13 years 24 days ago
Outer Trust-Region Method for Constrained Optimization
Given an algorithm A for solving some mathematical problem based on the iterative solution of simpler subproblems, an Outer Trust-Region (OTR) modification of A is the result of ...
Ernesto G. Birgin, Emerson V. Castelani, Andr&eacu...
ICCV
2011
IEEE
12 years 10 months ago
Understanding Scenes on Many Levels
This paper presents a framework for image parsing with multiple label sets. For example, we may want to simultaneously label every image region according to its basiclevel object ...
Joseph Tighe, Svetlana Lazebnik
CCS
2011
ACM
12 years 10 months ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
TACAS
2012
Springer
316views Algorithms» more  TACAS 2012»
12 years 5 months ago
Compositional Termination Proofs for Multi-threaded Programs
Abstract. Automated verification of multi-threaded programs is difficult. Direct treatment of all possible thread interleavings by reasoning about the program globally is a prohib...
Corneliu Popeea, Andrey Rybalchenko
CVPR
2012
IEEE
12 years 11 days ago
Scale resilient, rotation invariant articulated object matching
A novel method is proposed for matching articulated objects in cluttered videos. The method needs only a single exemplar image of the target object. Instead of using a small set o...
Hao Jiang, Tai-Peng Tian, Kun He, Stan Sclaroff