Sciweavers

2014 search results - page 226 / 403
» A P2P Approach for Global Computing
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 8 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
SAC
2008
ACM
15 years 4 months ago
A pull-based e-mail architecture
Conventional e-mail systems are prone to problems that impact their scalability and dependability. E-mail systems operate following a "push-based" approach: the sender s...
Edson Kageyama, Carlos Maziero, Altair Olivo Santi...
CVPR
2012
IEEE
13 years 7 months ago
Leveraging stereopsis for saliency analysis
Stereopsis provides an additional depth cue and plays an important role in the human vision system. This paper explores stereopsis for saliency analysis and presents two approache...
Yuzhen Niu, Yujie Geng, Xueqing Li, Feng Liu
CORR
2012
Springer
230views Education» more  CORR 2012»
14 years 7 days ago
RT-SLAM: A Generic and Real-Time Visual SLAM Implementation
Abstract. This article presents a new open-source C++ implementation to solve the SLAM problem, which is focused on genericity, versatility and high execution speed. It is based on...
Cyril Roussillon, Aurélien Gonzalez, Joan S...
CVPR
2007
IEEE
16 years 6 months ago
Optimizing Binary MRFs via Extended Roof Duality
Many computer vision applications rely on the efficient optimization of challenging, so-called non-submodular, binary pairwise MRFs. A promising graph cut based approach for optim...
Carsten Rother, Vladimir Kolmogorov, Victor S. Lem...