Sciweavers

1182 search results - page 225 / 237
» Iterative Methods in Combinatorial Optimization
Sort
View
CCS
2011
ACM
12 years 9 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
ICCV
2003
IEEE
14 years 11 months ago
Ranking Prior Likelihood Distributions for Bayesian Shape Localization Framework
In this paper, we formulate the shape localization problem in the Bayesian framework. In the learning stage, we propose the Constrained RankBoost approach to model the likelihood ...
Shuicheng Yan, Mingjing Li, HongJiang Zhang, QianS...
CVPR
2009
IEEE
1468views Computer Vision» more  CVPR 2009»
15 years 5 months ago
Hardware-Efficient Belief Propagation
Belief propagation (BP) is an effective algorithm for solving energy minimization problems in computer vision. However, it requires enormous memory, bandwidth, and computation beca...
Chao-Chung Cheng, Chia-Kai Liang, Homer H. Chen, L...
FGR
2000
IEEE
230views Biometrics» more  FGR 2000»
14 years 2 months ago
A Robust Model-Based Approach for 3D Head Tracking in Video Sequences
We present a generic and robust method for model-based global 3D head pose estimation in monocular and non-calibrated video sequences. The proposed method relies on a 3D/2D matchi...
Marius Malciu, Françoise J. Prêteux
BMCBI
2010
154views more  BMCBI 2010»
13 years 10 months ago
Fine-tuning structural RNA alignments in the twilight zone
Background: A widely used method to find conserved secondary structure in RNA is to first construct a multiple sequence alignment, and then fold the alignment, optimizing a score ...
Andreas Bremges, Stefanie Schirmer, Robert Giegeri...