Sciweavers

4150 search results - page 531 / 830
» A Practical Approach to Model Extension
Sort
View
160
Voted
ICCV
2011
IEEE
14 years 4 months ago
Simultaneous Correspondence and Non-Rigid 3D Reconstruction of the Coronary Tree from Single X-ray Images
We present a novel approach to simultaneously reconstruct the 3D structure of a non-rigid coronary tree and estimate point correspondences between an input X-ray image and a refer...
Eduard Serradell (Institut de Robotica i Informati...
CVPR
2006
IEEE
16 years 6 months ago
3D Facial Expression Recognition Based on Primitive Surface Feature Distribution
The creation of facial range models by 3D imaging systems has led to extensive work on 3D face recognition [19]. However, little work has been done to study the usefulness of such...
Jun Wang, Lijun Yin, Xiaozhou Wei, Yi Sun
CADE
2007
Springer
16 years 5 months ago
A History-based Verification of Distributed Applications
Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...
HICSS
2009
IEEE
144views Biometrics» more  HICSS 2009»
15 years 11 months ago
Privacy Preserving Decision Tree Mining from Perturbed Data
Privacy preserving data mining has been investigated extensively. The previous works mainly fall into two categories, perturbation and randomization based approaches and secure mu...
Li Liu, Murat Kantarcioglu, Bhavani M. Thuraisingh...
122
Voted
INFOCOM
2007
IEEE
15 years 11 months ago
SPREAD: Foiling Smart Jammers Using Multi-Layer Agility
— In this paper, we address the problem of cross-layer denial of service attack in wireless data networks. We introduce SPREAD - a novel adaptive diversification approach to pro...
Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan