Sciweavers

6229 search results - page 1134 / 1246
» Models of Computation for Networks on Chip
Sort
View
CCS
2009
ACM
14 years 1 months ago
TruWallet: trustworthy and migratable wallet-based web authentication
Identity theft has fostered to a major security problem on the Internet, in particular stealing passwords for web applications through phishing and malware. We present TruWallet, ...
Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadegh...
TIP
2008
144views more  TIP 2008»
13 years 9 months ago
Incremental Refinement of Image Salient-Point Detection
Low-level image analysis systems typically detect "points of interest", i.e., areas of natural images that contain corners or edges. Most of the robust and computationall...
Yiannis Andreopoulos, Ioannis Patras
CVPR
2009
IEEE
15 years 4 months ago
Co-training with Noisy Perceptual Observations
Many perception and multimedia indexing problems involve datasets that are naturally comprised of multiple streams or modalities for which supervised training data is only sparsely...
Ashish Kapoor, Chris Mario Christoudias, Raquel Ur...
CVPR
2005
IEEE
14 years 11 months ago
Learning to Estimate Human Pose with Data Driven Belief Propagation
We propose a statistical formulation for 2-D human pose estimation from single images. The human body configuration is modeled by a Markov network and the estimation problem is to...
Gang Hua, Ming-Hsuan Yang, Ying Wu
ECCV
2004
Springer
14 years 11 months ago
Estimating Intrinsic Images from Image Sequences with Biased Illumination
We present a method for estimating intrinsic images from a fixed-viewpoint image sequence captured under changing illumination directions. Previous work on this problem reduces the...
Yasuyuki Matsushita, Stephen Lin, Sing Bing Kang, ...
« Prev « First page 1134 / 1246 Last » Next »