Sciweavers

2725 search results - page 491 / 545
» Constraint Solving for Interpolation
Sort
View
JOTA
2011
78views more  JOTA 2011»
14 years 3 months ago
Outer Trust-Region Method for Constrained Optimization
Given an algorithm A for solving some mathematical problem based on the iterative solution of simpler subproblems, an Outer Trust-Region (OTR) modification of A is the result of ...
Ernesto G. Birgin, Emerson V. Castelani, Andr&eacu...
141
Voted
ICCV
2011
IEEE
14 years 21 days ago
Understanding Scenes on Many Levels
This paper presents a framework for image parsing with multiple label sets. For example, we may want to simultaneously label every image region according to its basiclevel object ...
Joseph Tighe, Svetlana Lazebnik
114
Voted
CCS
2011
ACM
14 years 20 days ago
WAPTEC: whitebox analysis of web applications for parameter tampering exploit construction
Parameter tampering attacks are dangerous to a web application whose server fails to replicate the validation of user-supplied data that is performed by the client. Malicious user...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
TACAS
2012
Springer
316views Algorithms» more  TACAS 2012»
13 years 8 months ago
Compositional Termination Proofs for Multi-threaded Programs
Abstract. Automated verification of multi-threaded programs is difficult. Direct treatment of all possible thread interleavings by reasoning about the program globally is a prohib...
Corneliu Popeea, Andrey Rybalchenko
CVPR
2012
IEEE
13 years 3 months ago
Scale resilient, rotation invariant articulated object matching
A novel method is proposed for matching articulated objects in cluttered videos. The method needs only a single exemplar image of the target object. Instead of using a small set o...
Hao Jiang, Tai-Peng Tian, Kun He, Stan Sclaroff