Sciweavers

784 search results - page 45 / 157
» Web-Site Boundary Detection
Sort
View
CVPR
2012
IEEE
11 years 11 months ago
The scale of edges
Although the scale of isotropic visual elements such as blobs and interest points, e.g. SIFT[12], has been well studied and adopted in various applications, how to determine the s...
Xianming Liu, Changhu Wang, Hongxun Yao, Lei Zhang
ICPR
2008
IEEE
14 years 10 months ago
An incremental method for accurate iris segmentation
The paper presents an incremental method for accurate iris segmentation. Firstly, observing the characteristics of iris images, we search for a square region that contains pupil w...
Peihua Li, Xiaomin Liu
CVPR
2010
IEEE
14 years 4 months ago
The Cluttered Background Problem for Active Contours: A Minimum-Latency Solution
We present a region-based active contour detection algorithm for objects that exhibit relatively homogeneous photometric characteristics (e.g. smooth color or gray levels), embedd...
Stefano Soatto, Ganesh Sundaramoorthi, Anthony Yez...
PET
2010
Springer
14 years 20 days ago
Collaborative, Privacy-Preserving Data Aggregation at Scale
Combining and analyzing data collected at multiple locations is critical for a wide variety of applications, such as detecting and diagnosing malicious attacks or computing an acc...
Benny Applebaum, Haakon Ringberg, Michael J. Freed...
ACSAC
2004
IEEE
14 years 14 days ago
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)
Buffer overflow vulnerabilities are caused by programming errors that allow an attacker to cause the program to write beyond the bounds of an allocated memory block to corrupt oth...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...