Sciweavers

2829 search results - page 457 / 566
» Regularization Methods for Additive Models
Sort
View
ECCV
2010
Springer
15 years 8 months ago
Detection and Tracking of Large Number of Targets in Wide Area Surveillance
In this paper, we tackle the problem of object detection and tracking in a new and challenging domain of wide area surveillance. This problem poses several challenges: large camera...
EMMCVPR
2009
Springer
15 years 8 months ago
Reconstructing Optical Flow Fields by Motion Inpainting
An edge-sensitive variational approach for the restoration of optical flow fields is presented. Real world optical flow fields are frequently corrupted by noise, reflection artifac...
Benjamin Berkels, Claudia Kondermann, Christoph S....
ATVA
2006
Springer
99views Hardware» more  ATVA 2006»
15 years 8 months ago
Whodunit? Causal Analysis for Counterexamples
Although the counterexample returned by a model checker can help in reproducing the symptom related to a defect, a significant amount of effort is often required for the programmer...
Chao Wang, Zijiang Yang, Franjo Ivancic, Aarti Gup...
140
Voted
CRYPTO
2006
Springer
92views Cryptology» more  CRYPTO 2006»
15 years 8 months ago
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f : {0, 1, . . . , N - 1} {0, 1, . . . , N - 1}. The model...
Elad Barkan, Eli Biham, Adi Shamir
DCOSS
2006
Springer
15 years 8 months ago
Y-Threads: Supporting Concurrency in Wireless Sensor Networks
Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
Christopher Nitta, Raju Pandey, Yann Ramin