Sciweavers

8780 search results - page 1583 / 1756
» On the Feasibility of Consistent Computations
Sort
View
EDBTW
2010
Springer
15 years 5 months ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...
CVPR
2009
IEEE
15 years 5 months ago
Tubular anisotropy for 2D vessel segmentation
In this paper, we present a new approach for segmentation of tubular structures in 2D images providing minimal interaction. The main objective is to extract centerlines and bounda...
Fethallah Benmansour, Laurent D. Cohen, Max W. K. ...
CVPR
2009
IEEE
15 years 5 months ago
Contextual decomposition of multi-label images
Most research on image decomposition, e.g. image segmentation and image parsing, has predominantly focused on the low-level visual clues within single image and neglected the cont...
Teng Li, Tao Mei, Shuicheng Yan, In-So Kweon, Chil...
107
Voted
CVPR
2009
IEEE
15 years 5 months ago
On compositional Image Alignment, with an application to Active Appearance Models
Efficient and accurate fitting of Active Appearance Models (AAM) is a key requirement for many applications. The most efficient fitting algorithm today is Inverse Compositiona...
Brian Amberg, Andrew Blake, Thomas Vetter
84
Voted
OZCHI
2009
ACM
15 years 5 months ago
Doing things backwards: the OWL project
The OWL project is inspired by Arthur C. Clarke's Third Law of Technology Prediction: Any sufficiently advanced technology is indistinguishable from magic. It consists of a s...
Danielle Wilde, Kristina Andersen
« Prev « First page 1583 / 1756 Last » Next »