Sciweavers

1291 search results - page 232 / 259
» Intrusion Detection for Distributed Applications
Sort
View
WWW
2011
ACM
13 years 3 months ago
Learning facial attributes by crowdsourcing in social media
Facial attributes such as gender, race, age, hair style, etc., carry rich information for locating designated persons and profiling the communities from image/video collections (...
Yan-Ying Chen, Winston H. Hsu, Hong-Yuan Mark Liao
TIP
2010
119views more  TIP 2010»
13 years 3 months ago
Fast Cartoon + Texture Image Filters
Abstract--Can images be decomposed into the sum of a geometric part and a textural part? In a theoretical breakthrough, [Y. Meyer, Oscillating Patterns in Image Processing and Nonl...
Antoni Buades, Triet M. Le, Jean-Michel Morel, Lum...
CVPR
2012
IEEE
11 years 11 months ago
The Shape Boltzmann Machine: A strong model of object shape
A good model of object shape is essential in applications such as segmentation, object detection, inpainting and graphics. For example, when performing segmentation, local constra...
S. M. Ali Eslami, Nicolas Heess, John M. Winn
EUROSYS
2006
ACM
14 years 5 months ago
Solving the starting problem: device drivers as self-describing artifacts
Run-time conflicts can affect even the most rigorously tested software systems. A reliance on execution-based testing makes it prohibitively costly to test every possible interac...
Michael F. Spear, Tom Roeder, Orion Hodson, Galen ...
WOSP
2010
ACM
14 years 3 months ago
Agile resource management in a virtualized data center
In this paper we develop, implement and evaluate an approach to quickly reassign resources for a virtualized utility computing platform. The approach provides this platform agilit...
Wei Zhang, Hangwei Qian, Craig E. Wills, Michael R...