Sciweavers

4965 search results - page 964 / 993
» A Simple Abstraction for Data Modeling
Sort
View
121
Voted
USS
2010
14 years 8 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
141
Voted
ICMI
2009
Springer
196views Biometrics» more  ICMI 2009»
14 years 8 months ago
Communicative gestures in coreference identification in multiparty meetings
During multiparty meetings, participants can use non-verbal modalities such as hand gestures to make reference to the shared environment. Therefore, one hypothesis is that incorpo...
Tyler Baldwin, Joyce Y. Chai, Katrin Kirchhoff
CVPR
2008
IEEE
16 years 7 days ago
Learning class-specific affinities for image labelling
Spectral clustering and eigenvector-based methods have become increasingly popular in segmentation and recognition. Although the choice of the pairwise similarity metric (or affin...
Dhruv Batra, Rahul Sukthankar, Tsuhan Chen
CVPR
2011
IEEE
14 years 7 months ago
Natural Image Denoising: Optimality and Inherent Bounds
The goal of natural image denoising is to estimate a clean version of a given noisy image, utilizing prior knowledge on the statistics of natural images. The problem has been stud...
Anat Levin, Boaz Nadler
CVPR
2011
IEEE
14 years 6 months ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang