In this paper, we study the question of whether or not it is possible to construct protocols for general secure computation in the setting of malicious adversaries and no honest m...
For more than thirty years, the parallel programming community has used the dependence graph as the main abstraction for reasoning about and exploiting parallelism in “regularâ€...
Keshav Pingali, Donald Nguyen, Milind Kulkarni, Ma...
We present a discriminative Hough transform based ob-
ject detector where each local part casts a weighted vote for
the possible locations of the object center. We show that the
...
Subhransu Maji (University of California, Berkeley...
A representative subspace is significant for image analysis, while the corresponding techniques often suffer from the curse of dimensionality dilemma. In this paper, we propose a ...
Dong Xu, Shuicheng Yan, Lei Zhang, HongJiang Zhang...
Segmentation involves separating an object from the background. In this work, we propose a novel segmentation method combining image information with prior shape knowledge, within...
Samuel Dambreville, Yogesh Rathi, Allen Tannenbaum