Sciweavers

2899 search results - page 560 / 580
» On the Complexity of Exclusion Algorithms for Optimization
Sort
View
SP
2010
IEEE
156views Security Privacy» more  SP 2010»
14 years 11 months ago
Round-Efficient Broadcast Authentication Protocols for Fixed Topology Classes
Abstract--We consider resource-constrained broadcast authentication for n receivers in a static, known network topology. There are only two known broadcast authentication protocols...
Haowen Chan, Adrian Perrig
KDD
2009
ACM
210views Data Mining» more  KDD 2009»
16 years 1 months ago
Large-scale behavioral targeting
Behavioral targeting (BT) leverages historical user behavior to select the ads most relevant to users to display. The state-of-the-art of BT derives a linear Poisson regression mo...
Ye Chen, Dmitry Pavlov, John F. Canny
CVPR
1999
IEEE
16 years 3 months ago
Bayesian Multi-Camera Surveillance
The task of multi-camera surveillance is to reconstruct the paths taken by all moving objects that are temporarily visible from multiple non-overlapping cameras. We present a Baye...
Vera Kettnaker, Ramin Zabih
ICCV
2001
IEEE
16 years 3 months ago
Image Segmentation by Data Driven Markov Chain Monte Carlo
?This paper presents a computational paradigm called Data-Driven Markov Chain Monte Carlo (DDMCMC) for image segmentation in the Bayesian statistical framework. The paper contribut...
Zhuowen Tu, Song Chun Zhu, Heung-Yeung Shum
ECCV
2006
Springer
16 years 3 months ago
Resolution-Aware Fitting of Active Appearance Models to Low Resolution Images
Abstract. Active Appearance Models (AAM) are compact representations of the shape and appearance of objects. Fitting AAMs to images is a difficult, non-linear optimization task. Tr...
Göksel Dedeoglu, Simon Baker, Takeo Kanade