Sciweavers

551 search results - page 48 / 111
» Preventing existence
Sort
View
ICCV
2009
IEEE
16 years 4 months ago
Image Segmentation with A Bounding Box Prior
User-provided object bounding box is a simple and popular interaction paradigm considered by many existing interactive image segmentation frameworks. However, these frameworks t...
Victor Lempitsky, Pushmeet Kohli, Carsten Rother, ...
ICCV
2009
IEEE
16 years 4 months ago
Heterogeneous Feature Machines for Visual Recognition
With the recent efforts made by computer vision researchers, more and more types of features have been designed to describe various aspects of visual characteristics. Modeling s...
Liangliang Cao, Jiebo Luo, Feng Liang, Thomas S. H...
ICIP
2006
IEEE
16 years 1 months ago
High Definition Video Transmission over Wlans with Time-Scale and R-D Optimized Rate Adaptation
In this paper, we propose a transrating based video rate adaptation technique for compressed high-definition video transmission over wireless local area networks. Our application ...
Mehmet Umut Demircin, Peter van Beek
ICDE
2008
IEEE
154views Database» more  ICDE 2008»
16 years 1 months ago
Butterfly: Protecting Output Privacy in Stream Mining
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...
Ting Wang, Ling Liu
ICML
2007
IEEE
16 years 20 days ago
Linear and nonlinear generative probabilistic class models for shape contours
We introduce a robust probabilistic approach to modeling shape contours based on a lowdimensional, nonlinear latent variable model. In contrast to existing techniques that use obj...
Graham McNeill, Sethu Vijayakumar