Sciweavers

1056 search results - page 31 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
DAS
2006
Springer
13 years 11 months ago
The Restoration of Camera Documents Through Image Segmentation
This paper presents a document restoration technique that is able to flatten curled document images captured through a digital camera. The proposed method corrects camera images of...
Shijian Lu, Chew Lim Tan
INFOCOM
2012
IEEE
11 years 10 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
CVPR
2012
IEEE
11 years 10 months ago
A closed-form solution to uncalibrated photometric stereo via diffuse maxima
In this paper we propose a novel solution to uncalibrated photometric stereo. Our approach is to eliminate the socalled generalized bas relief (GBR) ambiguity by exploiting points...
Paolo Favaro, Thoma Papadhimitri
USS
2010
13 years 5 months ago
Searching the Searchers with SearchAudit
Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities. With carefully craft...
John P. John, Fang Yu, Yinglian Xie, Martín...
SDM
2011
SIAM
242views Data Mining» more  SDM 2011»
12 years 10 months ago
Fast Algorithms for Finding Extremal Sets
Identifying the extremal (minimal and maximal) sets from a collection of sets is an important subproblem in the areas of data-mining and satisfiability checking. For example, ext...
Roberto J. Bayardo, Biswanath Panda