Sciweavers

2714 search results - page 449 / 543
» Under the table interaction
Sort
View
CSFW
2012
IEEE
12 years 15 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
CVPR
2012
IEEE
12 years 14 days ago
Curvature-based regularization for surface approximation
We propose an energy-based framework for approximating surfaces from a cloud of point measurements corrupted by noise and outliers. Our energy assigns a tangent plane to each (noi...
Carl Olsson, Yuri Boykov
AAAI
2012
12 years 13 days ago
Adaptive Polling for Information Aggregation
The flourishing of online labor markets such as Amazon Mechanical Turk (MTurk) makes it easy to recruit many workers for solving small tasks. We study whether information elicita...
Thomas Pfeiffer, Xi Alice Gao, Yiling Chen, Andrew...
CVPR
2009
IEEE
1372views Computer Vision» more  CVPR 2009»
15 years 5 months ago
Blind motion deblurring from a single image using sparse approximation
Restoring a clear image from a single motion-blurred image due to camera shake has long been a challenging problem in digital imaging. Existing blind deblurring techniques eithe...
Jian-Feng Cai (National University of Singapore), ...
ICCV
1999
IEEE
14 years 12 months ago
Vision in Bad Weather
Current vision systems are designed to perform in clear weather. Needless to say, in any outdoor application, there is no escape from "bad" weather. Ultimately, computer...
Shree K. Nayar, Srinivasa G. Narasimhan