Sciweavers

5948 search results - page 919 / 1190
» Computing Robust Counter-Strategies
Sort
View
DSN
2005
IEEE
15 years 10 months ago
Perturbation-Resistant and Overlay-Independent Resource Discovery
This paper realizes techniques supporting the position that strategies for resource location and discovery in distributed systems should be both perturbation-resistant and overlay...
Steven Y. Ko, Indranil Gupta
DSN
2005
IEEE
15 years 10 months ago
SMRP: Fast Restoration of Multicast Sessions from Persistent Failures
The growing reliance of networked applications on timely and reliable data transfer requires the underlying networking infrastructure to provide adequate services even in the pres...
Jian Wu, Kang G. Shin
ICCV
2005
IEEE
15 years 10 months ago
Exploring the Space of a Human Action
One of the fundamental challenges of recognizing actions is accounting for the variability that arises when arbitrary cameras capture humans performing actions. In this paper, we ...
Yaser Sheikh, Mumtaz Sheikh, Mubarak Shah
ICCV
2005
IEEE
15 years 10 months ago
Contour-Based Learning for Object Detection
We present a novel categorical object detection scheme that uses only local contour-based features. A two-stage, partially supervised learning architecture is proposed: a rudiment...
Jamie Shotton, Andrew Blake, Roberto Cipolla
ICCV
2005
IEEE
15 years 10 months ago
Spherical Matching for Temporal Correspondence of Non-Rigid Surfaces
This paper introduces spherical matching to estimate dense temporal correspondence of non-rigid surfaces with genus-zero topology. The spherical domain gives a consistent 2D param...
Jonathan Starck, Adrian Hilton