Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
This paper presents a task-centric memory model for 1000-core compute accelerators. Visual computing applications are emerging as an important class of workloads that can exploit ...
John H. Kelm, Daniel R. Johnson, Steven S. Lumetta...
2D Active Appearance Models (AAM) and 3D Morphable
Models (3DMM) are widely used techniques. AAM
provide a fast fitting process, but may represent unwanted
3D transformations un...
We analyze the modulation of a light field via nonrefracting attenuators. In the most general case, any desired modulation can be achieved with attenuators having four degrees of ...
Ashok Veeraraghavan, Amit K. Agrawal, Ramesh Raska...
In this paper, we present a stochastic algorithm by effective Markov chain Monte Carlo (MCMC) for segmenting and reconstructing 3D scenes. The objective is to segment a range image...