Sciweavers

537 search results - page 93 / 108
» Regularization of B-spline objects
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks
—The design of computer and communication systems has been based, for decades, on the fundamental assumption that the objective of all users is to improve their own performance. ...
Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy
IWCM
2004
Springer
14 years 1 months ago
Bayesian Approaches to Motion-Based Image and Video Segmentation
We present a variational approach for segmenting the image plane into regions of piecewise parametric motion given two or more frames from an image sequence. Our model is based on ...
Daniel Cremers
NPAR
2010
ACM
14 years 1 months ago
Vector fluid: a vector graphics depiction of surface flow
We present a simple technique for creating fluid silhouettes described with vector graphics, which we call ”Vector Fluid.” In our system, a solid region in the fluid is repr...
Ryoichi Ando, Reiji Tsuruno
SDM
2008
SIAM
139views Data Mining» more  SDM 2008»
13 years 10 months ago
Simultaneous Unsupervised Learning of Disparate Clusterings
Most clustering algorithms produce a single clustering for a given data set even when the data can be clustered naturally in multiple ways. In this paper, we address the difficult...
Prateek Jain, Raghu Meka, Inderjit S. Dhillon
BMCBI
2005
131views more  BMCBI 2005»
13 years 8 months ago
Critical evaluation of the JDO API for the persistence and portability requirements of complex biological databases
Background: Complex biological database systems have become key computational tools used daily by scientists and researchers. Many of these systems must be capable of executing on...
Marko Srdanovic, Ulf Schenk, Michael Schwieger, Fa...