Sciweavers

11231 search results - page 2076 / 2247
» Digging for Data Structures
Sort
View
CVPR
2004
IEEE
16 years 4 months ago
High-Zoom Video Hallucination by Exploiting Spatio-Temporal Regularities
In this paper, we consider the problem of super-resolving a human face video by a very high (?16) zoom factor. Inspired by recent literature on hallucination and examplebased lear...
Göksel Dedeoglu, Jonas August, Takeo Kanade
CVPR
2006
IEEE
16 years 4 months ago
Robust Fragments-based Tracking using the Integral Histogram
We present a novel algorithm (which we call "FragTrack") for tracking an object in a video sequence. The template object is represented by multiple image fragments or pa...
Amit Adam, Ehud Rivlin, Ilan Shimshoni
ICDE
2009
IEEE
147views Database» more  ICDE 2009»
16 years 4 months ago
Separating Authentication from Query Execution in Outsourced Databases
-- In the database outsourcing paradigm, a data owner (DO) delegates its DBMS administration to a specialized service provider (SP) that receives and processes queries from clients...
Stavros Papadopoulos, Dimitris Papadias, Weiwei Ch...
ICDE
2009
IEEE
177views Database» more  ICDE 2009»
16 years 4 months ago
Light-Weight, Runtime Verification of Query Sources
Modern database systems increasingly make use of networked storage. This storage can be in the form of SAN's or in the form of shared-nothing nodes in a cluster. One type of a...
Tingjian Ge, Stanley B. Zdonik
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 4 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...
« Prev « First page 2076 / 2247 Last » Next »