As such, public-key encryption with keyword search (a.k.a PEKS or searchable encryption) does not allow the recipient to decrypt keywords i.e. encryption is not invertible. This pa...
In this paper we present a variational, spatiotemporal video super resolution scheme that produces not just one but n high resolution video frames from an n frame low resolution vi...
A video Cut Detector (CD), a member of the Shot Boundary Detector (SBD) group, is an essential element for spatio-temporal audiovisual (AV) segmentation and various video-processi...
Jan Nesvadba, Fabian Ernst, Jernej Perhavc, Jenny ...
Constraints formalize the dependencies in a physical world in terms of a logical relation among several unknowns. Constraint satisfaction methods allow efficient navigation of larg...
Abstract. One of the most appealing features of constraint programming is its rich constraint language for expressing combinatorial optimization problems. This paper demonstrates t...