Sciweavers

186 search results - page 37 / 38
» Learning about Constraints by Reflection
Sort
View
MM
2010
ACM
219views Multimedia» more  MM 2010»
13 years 5 months ago
A framework for photo-quality assessment and enhancement based on visual aesthetics
We present an interactive application that enables users to improve the visual aesthetics of their digital photographs using spatial recomposition. Unlike earlier work that focuse...
Subhabrata Bhattacharya, Rahul Sukthankar, Mubarak...
ICDM
2008
IEEE
156views Data Mining» more  ICDM 2008»
13 years 11 months ago
Exploiting Local and Global Invariants for the Management of Large Scale Information Systems
This paper presents a data oriented approach to modeling the complex computing systems, in which an ensemble of correlation models are discovered to represent the system status. I...
Haifeng Chen, Haibin Cheng, Guofei Jiang, Kenji Yo...
EUROCRYPT
2010
Springer
13 years 10 months ago
Public-Key Encryption in the Bounded-Retrieval Model
We construct the first public-key encryption scheme in the Bounded-Retrieval Model (BRM), providing security against various forms of adversarial “key leakage” attacks. In th...
Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Se...
ER
1999
Springer
196views Database» more  ER 1999»
13 years 9 months ago
A Process-Integrated Conceptual Design Environment for Chemical Engineering
Abstract. The process industries (chemicals, food, oil, ...) are characterized by - continuous or batch -- processes of material transformation. The design of such processes, and t...
Matthias Jarke, Thomas List, Klaus Weidenhaupt
ECCV
2010
Springer
13 years 8 months ago
Recursive Coarse-to-Fine Localization for fast Object Detection
Cascading techniques are commonly used to speed-up the scan of an image for object detection. However, cascades of detectors are slow to train due to the high number of detectors a...
Marco Pedersoli, Jordi Gonzàlez, Andrew D. Bagdan...