Sciweavers

833 search results - page 89 / 167
» Wallet Databases with Observers
Sort
View
137
Voted
IACR
2011
115views more  IACR 2011»
14 years 2 months ago
Multi-Server Oblivious RAM
Secure two-party computation protocol allows two players, Alice with secret input x and Bob with secret input y, to jointly execute an arbitrary program π(x, y) such that only th...
Steve Lu, Rafail Ostrovsky
ICCV
2009
IEEE
16 years 7 months ago
Super-Resolution from a Single Image
Methods for super-resolution can be broadly classified into two families of methods: (i) The classical multi-image super-resolution (combining images obtained at subpixel misali...
Daniel Glasner, Shai Bagon, Michal Irani
ICCV
2009
IEEE
3893views Computer Vision» more  ICCV 2009»
16 years 5 months ago
 Super-Resolution From a Single Image
Methods for super-resolution (SR) can be broadly classified into two families of methods: (i) The classical multi-image super-resolution (combining images obtained at subpixel misa...
Daniel Glasner, Shai Bagon, and Michal Irani
128
Voted
CVPR
2006
IEEE
16 years 4 months ago
Using Bilinear Models for View-invariant Action and Identity Recognition
Human identification from gait is a challenging task in realistic surveillance scenarios in which people walking along arbitrary directions are shot by a single camera. In this pa...
Fabio Cuzzolin
ECCV
2008
Springer
16 years 4 months ago
The Naked Truth: Estimating Body Shape Under Clothing
We propose a method to estimate the detailed 3D shape of a person from images of that person wearing clothing. The approach exploits a model of human body shapes that is learned fr...
Alexandru O. Balan, Michael J. Black