Sciweavers

2925 search results - page 517 / 585
» Input Modeling Using Quantile Statistical Methods
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
13 years 8 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
CVPR
2007
IEEE
14 years 11 months ago
Face Re-Lighting from a Single Image under Harsh Lighting Conditions
In this paper, we present a new method to change the illumination condition of a face image, with unknown face geometry and albedo information. This problem is particularly diffic...
Yang Wang, Zicheng Liu, Gang Hua, Zhen Wen, Zhengy...
ICCV
2003
IEEE
14 years 11 months ago
Graph Partition by Swendsen-Wang Cuts
Vision tasks, such as segmentation, grouping, recognition, can be formulated as graph partition problems. The recent literature witnessed two popular graph cut algorithms: the Ncu...
Adrian Barbu, Song Chun Zhu
ICPR
2008
IEEE
14 years 10 months ago
Generic scale-space process for handwriting documents analysis
This paper presents a generic architecture for handwriting documents analysis. It covers all analysis steps from the content description of the document (layout analysis, handwrit...
Guillaume Joutel, Hubert Emptoz, Véronique ...
ICCAD
2006
IEEE
169views Hardware» more  ICCAD 2006»
14 years 5 months ago
Microarchitecture parameter selection to optimize system performance under process variation
Abstract— Design variability due to within-die and die-todie process variations has the potential to significantly reduce the maximum operating frequency and the effective yield...
Xiaoyao Liang, David Brooks