Sciweavers

539 search results - page 77 / 108
» On Modelling User Observations in the UTP
Sort
View
PAMI
2012
11 years 10 months ago
Fast Joint Estimation of Silhouettes and Dense 3D Geometry from Multiple Images
—We propose a probabilistic formulation of joint silhouette extraction and 3D reconstruction given a series of calibrated 2D images. Instead of segmenting each image separately i...
Kalin Kolev, Thomas Brox, Daniel Cremers
VIS
2007
IEEE
152views Visualization» more  VIS 2007»
14 years 9 months ago
An Effective Illustrative Visualization Framework Based on Photic Extremum Lines (PELs)
Conveying shape using feature lines is an important visualization tool in visual computing. The existing feature lines (e.g., ridges, valleys, silhouettes, suggestive contours, etc...
Xuexiang Xie, Ying He, Feng Tian, Hock-Soon Sea...
INFOCOM
2008
IEEE
14 years 2 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
MINENET
2006
ACM
14 years 1 months ago
Diagnosis of TCP overlay connection failures using bayesian networks
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
George J. Lee, Lindsey Poole
ESORICS
2008
Springer
13 years 9 months ago
A Framework for the Analysis of Mix-Based Steganographic File Systems
Abstract. The goal of Steganographic File Systems (SFSs) is to protect users from coercion attacks by providing plausible deniability on the existence of hidden files. We consider ...
Claudia Díaz, Carmela Troncoso, Bart Prenee...