Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
In object-oriented programming, unique permissions to object references are useful for checking correctness properties such as consistency of typestate and noninterference of conc...
Karl Naden, Robert Bocchino, Jonathan Aldrich, Kev...
We present a new approach to iteratively estimate both
high-quality depth map and alpha matte from a single image
or a video sequence. Scene depth, which is invariant
to illumin...
Jiejie Zhu (University of Kentucky), Miao Liao (Un...
Scene appearance from the point of view of a light source
is called a reciprocal or dual view. Since there exists a large
diversity in illumination, these virtual views may be no...
A dynamic layer representation is proposed in this paper for tracking moving objects. Previous work on layered representations has largely concentrated on two-/multiframe batch fo...