Sciweavers

1380 search results - page 235 / 276
» Learning Hierarchical Shape Models from Examples
Sort
View
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 6 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng
UAI
2003
13 years 9 months ago
On Information Regularization
We formulate a principle for classification with the knowledge of the marginal distribution over the data points (unlabeled data). The principle is cast in terms of Tikhonov styl...
Adrian Corduneanu, Tommi Jaakkola

Tutorial
2031views
15 years 2 months ago
Gradient Domain Manipulation Techniques in Vision and Graphics
The last decade has seen a tremendous interest in gradient domain manipulation techniques for applications in vision and graphics including retinex, high dynamic range (HDR) tone m...
Amit Agrawal and Ramesh Raskar
CODES
2006
IEEE
14 years 1 months ago
Resource virtualization in real-time CORBA middleware
Middleware for parallel and distributed systems is designed to virtualize computation and communication resources so that a more and consistent view of those resources is presente...
Christopher D. Gill
CVPR
2006
IEEE
14 years 1 months ago
Multi-Aspect Detection of Articulated Objects
A wide range of methods have been proposed to detect and recognize objects. However, effective and efficient multiviewpoint detection of objects is still in its infancy, since mo...
Edgar Seemann, Bastian Leibe, Bernt Schiele