Sciweavers

3220 search results - page 70 / 644
» Constrained Graph Processes
Sort
View
117
Voted
CORR
2010
Springer
67views Education» more  CORR 2010»
14 years 10 months ago
Secret Sharing LDPC Codes for the Constrained Gaussian Wiretap Channel
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presenc...
Chan Wong Wong, Tan F. Wong, John M. Shea
PAMI
2012
13 years 3 months ago
CPMC: Automatic Object Segmentation Using Constrained Parametric Min-Cuts
—We present a novel framework to generate and rank plausible hypotheses for the spatial extent of objects in images using bottom-up computational processes and mid-level selectio...
João Carreira, Cristian Sminchisescu
PET
2012
Springer
13 years 3 months ago
Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients
The continuing advancements in microprocessor technologies are putting more and more computing power into small devices. Today smartphones are especially popular. Nevertheless, for...
Martin Pirker, Daniel Slamanig, Johannes Winter
99
Voted
ECCV
2008
Springer
16 years 2 months ago
Non-local Regularization of Inverse Problems
This article proposes a new framework to regularize linear inverse problems using the total variation on non-local graphs. This nonlocal graph allows to adapt the penalization to t...
Gabriel Peyré, Laurent D. Cohen, Séb...
87
Voted
ICPR
2006
IEEE
16 years 1 months ago
Video Completion for Perspective Camera Under Constrained Motion
This paper presents a novel technique to fill in missing background and moving foreground of a video captured by a static or moving camera. Different from previous efforts which a...
Yuping Shen, Fei Lu, Xiaochun Cao, Hassan Foroosh