Sciweavers

1058 search results - page 159 / 212
» It's Doomed; We Can Prove It
Sort
View
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 3 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ICCV
2001
IEEE
14 years 12 months ago
A Novel Modeling Algorithm for Shape Recovery of Unknown Topology
This paper presents a novel modeling algorithm that is capable of simultaneously recovering correct shape geometry as well as its unknown topology from arbitrarily complicated dat...
Ye Duan, Hong Qin
VLDB
2007
ACM
155views Database» more  VLDB 2007»
14 years 4 months ago
Best Position Algorithms for Top-k Queries
The general problem of answering top-k queries can be modeled using lists of data items sorted by their local scores. The most efficient algorithm proposed so far for answering to...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
ICCV
2005
IEEE
14 years 12 months ago
Integration of Conditionally Dependent Object Features for Robust Figure/Background Segmentation
We propose a new technique for fusing multiple cues to robustly segment an object from its background in video sequences that suffer from abrupt changes of both illumination and p...
Francesc Moreno-Noguer, Alberto Sanfeliu, Dimitris...
ICCV
2003
IEEE
14 years 12 months ago
An affine invariant deformable shape representation for general curves
Automatic construction of Shape Models from examples has been the focus of intense research during the last couple of years. These methods have proved to be useful for shape segme...
Anders Ericsson, Kalle Åström