Sciweavers

2714 search results - page 449 / 543
» Under the table interaction
Sort
View
158
Voted
CSFW
2012
IEEE
13 years 5 months ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
144
Voted
CVPR
2012
IEEE
13 years 5 months ago
Curvature-based regularization for surface approximation
We propose an energy-based framework for approximating surfaces from a cloud of point measurements corrupted by noise and outliers. Our energy assigns a tangent plane to each (noi...
Carl Olsson, Yuri Boykov
AAAI
2012
13 years 5 months ago
Adaptive Polling for Information Aggregation
The flourishing of online labor markets such as Amazon Mechanical Turk (MTurk) makes it easy to recruit many workers for solving small tasks. We study whether information elicita...
Thomas Pfeiffer, Xi Alice Gao, Yiling Chen, Andrew...
CVPR
2009
IEEE
1372views Computer Vision» more  CVPR 2009»
16 years 10 months ago
Blind motion deblurring from a single image using sparse approximation
Restoring a clear image from a single motion-blurred image due to camera shake has long been a challenging problem in digital imaging. Existing blind deblurring techniques eithe...
Jian-Feng Cai (National University of Singapore), ...
ICCV
1999
IEEE
16 years 5 months ago
Vision in Bad Weather
Current vision systems are designed to perform in clear weather. Needless to say, in any outdoor application, there is no escape from "bad" weather. Ultimately, computer...
Shree K. Nayar, Srinivasa G. Narasimhan