Sciweavers

853 search results - page 140 / 171
» Flexible authentication of images
Sort
View
ICIP
2009
IEEE
14 years 9 months ago
Secure Distortion Computation Among Untrusting Parties Using Homomorphic Encryption
Alice and Bob possess sequences xn and yn respectively and would like to compute d(xn , yn ) where d(., .) is a distortion measure. However, Alice and Bob do not trust each other ...
ICMLA
2007
13 years 10 months ago
Understanding Challenges in Preserving and Reconstructing Computer-Assisted Medical Decision Processes
— This paper addresses the problem of understanding preservation and reconstruction requirements for computeraided medical decision-making. With an increasing number of computer-...
Sang-Chul Lee, Peter Bajcsy
CVPR
2008
IEEE
14 years 10 months ago
Sketching in the air: A vision-based system for 3D object design
3D object design has many applications including flexible 3D sketch input in CAD, computer game, webpage content design, image based object modeling, and 3D object retrieval. Most...
Yu Chen, Jianzhuang Liu, Xiaoou Tang
CVPR
2009
IEEE
15 years 3 months ago
Learning Optimized MAP Estimates in Continuously-Valued MRF Models
We present a new approach for the discriminative training of continuous-valued Markov Random Field (MRF) model parameters. In our approach we train the MRF model by optimizing t...
Kegan G. G. Samuel, Marshall F. Tappen
ICCV
2007
IEEE
14 years 10 months ago
Hierarchical Part-Template Matching for Human Detection and Segmentation
Local part-based human detectors are capable of handling partial occlusions efficiently and modeling shape articulations flexibly, while global shape template-based human detector...
Zhe Lin, Larry S. Davis, David S. Doermann, Daniel...