Sciweavers

1585 search results - page 256 / 317
» Automatically optimizing secure computation
Sort
View
ICPR
2010
IEEE
15 years 2 months ago
Near-Regular BTF Texture Model
—In this paper we present a method for seamless enlargement and editing of intricate near-regular type of bidirectional texture function (BTF) which contains simultaneously both ...
Michael Haindl, Martin Hatka
DAC
2005
ACM
15 years 1 months ago
Total power reduction in CMOS circuits via gate sizing and multiple threshold voltages
Minimizing power consumption is one of the most important objectives in IC design. Resizing gates and assigning different Vt’s are common ways to meet power and timing budgets. ...
Feng Gao, John P. Hayes
CVPR
2008
IEEE
15 years 1 months ago
Building reconstruction from a single DEM
We present a new approach for building reconstruction from a single Digital Elevation Model (DEM). It treats buildings as an assemblage of simple urban structures extracted from a...
Florent Lafarge, Xavier Descombes, Josiane Zerubia...
NIPS
2008
15 years 1 months ago
An Homotopy Algorithm for the Lasso with Online Observations
It has been shown that the problem of 1-penalized least-square regression commonly referred to as the Lasso or Basis Pursuit DeNoising leads to solutions that are sparse and there...
Pierre Garrigues, Laurent El Ghaoui
TOG
2008
92views more  TOG 2008»
14 years 11 months ago
Self-animating images: illusory motion using repeated asymmetric patterns
Illusory motion in a still image is a fascinating research topic in the study of human motion perception. Physiologists and psychologists have attempted to understand this phenome...
Ming-Te Chi, Tong-Yee Lee, Yingge Qu, Tien-Tsin Wo...