Sciweavers

1585 search results - page 251 / 317
» Automatically optimizing secure computation
Sort
View
SAC
2008
ACM
14 years 11 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
CVPR
2009
IEEE
16 years 7 months ago
Nonrigid Shape Recovery by Gaussian Process Regression
Most state-of-the-art nonrigid shape recovery methods usually use explicit deformable mesh models to regularize surface deformation and constrain the search space. These triangu...
Jianke Zhu, Michael R. Lyu, Steven C. H. Hoi
CVPR
2005
IEEE
16 years 1 months ago
Digital Tapestry
This paper addresses the novel problem of automatically synthesizing an output image from a large collection of different input images. The synthesized image, called a digital tap...
Carsten Rother, Sanjiv Kumar, Vladimir Kolmogorov,...
CVPR
2008
IEEE
16 years 1 months ago
Interactive image segmentation via minimization of quadratic energies on directed graphs
We propose a scheme to introduce directionality in the Random Walker algorithm for image segmentation. In particular, we extend the optimization framework of this algorithm to com...
Dheeraj Singaraju, Leo Grady, René Vidal
ECCV
2008
Springer
16 years 1 months ago
Analysis of Building Textures for Reconstructing Partially Occluded Facades
Abstract. As part of an architectural modeling project, this paper investigates the problem of understanding and manipulating images of buildings. Our primary motivation is to auto...
Thommen Korah, Christopher Rasmussen