Sciweavers

1181 search results - page 191 / 237
» constraints 2004
Sort
View
VLDB
2004
ACM
134views Database» more  VLDB 2004»
14 years 2 months ago
Memory-Limited Execution of Windowed Stream Joins
We address the problem of computing approximate answers to continuous sliding-window joins over data streams when the available memory may be insufficient to keep the entire join...
Utkarsh Srivastava, Jennifer Widom
3DPVT
2004
IEEE
126views Visualization» more  3DPVT 2004»
14 years 14 days ago
Helmholtz Stereopsis on Rough and Strongly Textured Surfaces
Helmholtz Stereopsis (HS) has recently been explored as a promising technique for capturing shape of objects with unknown reflectance. So far, it has been widely applied to object...
Jean-Yves Guillemaut, Ondrej Drbohlav, Radim S&aac...
3DPVT
2004
IEEE
250views Visualization» more  3DPVT 2004»
14 years 14 days ago
Multiple View Reconstruction of People
This paper presents a unified framework for model-based and model-free reconstruction of people from multiple camera views in a studio environment. Shape and appearance of the rec...
Adrian Hilton, Jonathan Starck
3DPVT
2004
IEEE
181views Visualization» more  3DPVT 2004»
14 years 14 days ago
Segmenting Correlation Stereo Range Images using Surface Elements
This paper describes methods for segmenting planar surfaces from noisy 3D data obtained from correlation stereo vision. We make use of local planar surface elements called patchle...
Don Murray, James J. Little
ACSAC
2004
IEEE
14 years 14 days ago
Static Analyzer of Vicious Executables (SAVE)
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...