Sciweavers

4335 search results - page 779 / 867
» Privatizing Constraint Optimization
Sort
View
ICIP
2010
IEEE
14 years 8 months ago
Video retargeting: A visual-friendly dynamic programming approach
Video retargeting is the task of fitting standard-sized video into arbitrary screen. A compelling retargeting attempts to preserve most visual information of original video as wel...
Zheng Yuan, Taoran Lu, Yu Huang, Dapeng Wu, Heathe...
SICHERHEIT
2010
14 years 8 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
CIMAGING
2009
130views Hardware» more  CIMAGING 2009»
14 years 8 months ago
Quantitative phase and amplitude imaging using Differential-Interference Contrast (DIC) microscopy
We present an extension of the development of an alternating minimization (AM) method1 for the computation of a specimen's complex transmittance function (magnitude and phase...
Chrysanthe Preza, Joseph A. O'Sullivan
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
14 years 8 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
ICIP
2009
IEEE
14 years 7 months ago
Total variation projection with first order schemes
This article proposes a new algorithm to compute the projection on the set of images whose total variation is bounded by a constant. The projection is computed through a dual form...
Mohamed-Jalal Fadili, Gabriel Peyré