Sciweavers

24529 search results - page 4727 / 4906
» Computing on Authenticated Data
Sort
View
HUC
2011
Springer
14 years 3 months ago
Sundroid: solar radiation awareness with smartphones
While the sun is important for our health, overexposure to sunlight carries significant health risks ranging from sunburn to skin cancer. Although people know about these risks, ...
Thomas Fahrni, Michael Kuhn 0002, Philipp Sommer, ...
179
Voted
CVPR
2008
IEEE
15 years 3 months ago
Tracking distributions with an overlap prior
Recent studies have shown that embedding similarity/dissimilarity measures between distributions in the variational level set framework can lead to effective object segmentation/t...
Ismail Ben Ayed, Shuo Li, Ian G. Ross
SMA
2009
ACM
132views Solid Modeling» more  SMA 2009»
15 years 10 months ago
Robust Voronoi-based curvature and feature estimation
Many algorithms for shape analysis and shape processing rely on accurate estimates of differential information such as normals and curvature. In most settings, however, care must...
Quentin Mérigot, Maks Ovsjanikov, Leonidas ...
170
Voted
CORR
2012
Springer
170views Education» more  CORR 2012»
13 years 11 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
PAM
2012
Springer
13 years 11 months ago
OFLOPS: An Open Framework for OpenFlow Switch Evaluation
Recent efforts in software-defined networks, such as OpenFlow, give unprecedented access into the forwarding plane of networking equipment. When building a network based on OpenFl...
Charalampos Rotsos, Nadi Sarrar, Steve Uhlig, Rob ...
« Prev « First page 4727 / 4906 Last » Next »