Sciweavers

5665 search results - page 54 / 1133
» Introduction to Computer Security
Sort
View
129
Voted
FCS
2006
15 years 3 months ago
Cryptographic and Computational Challenges in Grid Computing
A computational grid is a large-scale distributed computing environment capable of providing dependable, consistent, pervasive, and inexpensive access to high-end computational re...
Song Y. Yan, Glyn James, Gongyi Wu
180
Voted
CVPR
2009
IEEE
16 years 9 months ago
Illumination and Spatially Varying Specular Reflectance from a Single View
Estimating the illumination and the reflectance properties of an object surface from a sparse set of images is an important but inherently ill-posed problem. The problem becomes...
Kenji Hara (Kyushu University), Ko Nishino (Drexel...
135
Voted
CVPR
2009
IEEE
16 years 9 months ago
Granularity-tunable Gradients Partition (GGP) Descriptors for Human Detection
This paper proposes a novel descriptor, granularitytunable gradients partition (GGP), for human detection. The concept granularity is used to define the spatial and angular unce...
Yazhou Liu (Harbin Institute of Technology), Shigu...
107
Voted
CVPR
2009
IEEE
16 years 9 months ago
Discriminative Subvolume Search for Efficient Action Detection
Actions are spatio-temporal patterns which can be characterized by collections of spatio-temporal invariant features. Detection of actions is to find the re-occurrences (e.g. th...
Junsong Yuan (Northwestern University), Zicheng Li...
136
Voted
ECCV
2006
Springer
16 years 4 months ago
Towards Optimal Training of Cascaded Detectors
Cascades of boosted ensembles have become popular in the object detection community following their highly successful introduction in the face detector of Viola and Jones [1]. In t...
S. Charles Brubaker, Matthew D. Mullin, James M. R...