Sciweavers

139 search results - page 16 / 28
» Modeling the invisible college
Sort
View
ECCV
2002
Springer
14 years 11 months ago
New Techniques for Automated Architectural Reconstruction from Photographs
Abstract. We investigate a strategy for reconstructing of buildings from multiple (uncalibrated) images. In a similar manner to the Facade approach we first generate a coarse piece...
Tomás Werner, Andrew Zisserman
IM
2007
13 years 11 months ago
Issues in Designing a Policy Language for Distributed Management of IT Infrastructures
— The objectives of this paper are twofold. First, we introduce a novel policy language, called CIM-SPL (Simple Policy Language for CIM) that complies with the CIM (Common Inform...
Dakshi Agrawal, Seraphin B. Calo, Kang-Won Lee, Jo...
SAC
2009
ACM
14 years 4 months ago
GTfold: a scalable multicore code for RNA secondary structure prediction
The prediction of the correct secondary structures of large RNAs is one of the unsolved challenges of computational molecular biology. Among the major obstacles is the fact that a...
Amrita Mathuriya, David A. Bader, Christine E. Hei...
ICCV
2001
IEEE
14 years 11 months ago
Structure and Motion from Silhouettes
This paper addresses the problem of recovering structure and motion from silhouettes. Silhouettes are projections of contour generators which are viewpoint dependent, and hence do...
Kwan-Yee Kenneth Wong, Roberto Cipolla
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
14 years 10 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay