Sciweavers

739 search results - page 57 / 148
» Security Challenges in Cloud Computing
Sort
View
IPOM
2009
Springer
15 years 10 months ago
Security Considerations for Intrinsic Monitoring within IPv6 Networks
Abstract. Intrinsic Monitoring is a method of collecting and disseminating node specific monitoring data throughout an IPv6 network by using the IPv6 extension headers as a carrie...
Lei Shi, Alan Davy
149
Voted
ECCV
2004
Springer
16 years 6 months ago
Shape Reconstruction from 3D and 2D Data Using PDE-Based Deformable Surfaces
In this paper, we propose a new PDE-based methodology for deformable surfaces that is capable of automatically evolving its shape to capture the geometric boundary of the data and ...
Ye Duan, Liu Yang, Hong Qin, Dimitris Samaras
CVPR
2009
IEEE
16 years 11 months ago
Contextual Classification with Functional Max-Margin Markov Networks
We address the problem of label assignment in computer vision: given a novel 3-D or 2-D scene, we wish to assign a unique label to every site (voxel, pixel, superpixel, etc.). To...
Daniel Munoz, James A. Bagnell, Martial Hebert, Ni...
CVPR
2007
IEEE
16 years 6 months ago
A Multi-Scale Tikhonov Regularization Scheme for Implicit Surface Modelling
Kernel machines have recently been considered as a promising solution for implicit surface modelling. A key challenge of machine learning solutions is how to fit implicit shape mo...
Jianke Zhu, Steven C. H. Hoi, Michael R. Lyu
AINA
2010
IEEE
15 years 9 months ago
Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANs
—In this paper we present a new cross-platform approach for video game delivery in wired and wireless local networks. The developed 3D streaming and video streaming approaches en...
Audrius Jurgelionis, Francesco Bellotti, Alessandr...