Sciweavers

2311 search results - page 443 / 463
» Robustness and Generalization
Sort
View
CL
2010
Springer
15 years 2 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CGF
2008
201views more  CGF 2008»
15 years 1 months ago
High-Resolution Volumetric Computation of Offset Surfaces with Feature Preservation
We present a new algorithm for the efficient and reliable generation of offset surfaces for polygonal meshes. The algorithm is robust with respect to degenerate configurations and...
Darko Pavic, Leif Kobbelt
COMPSEC
2008
111views more  COMPSEC 2008»
15 years 1 months ago
An ontology-based policy for deploying secure SIP-based VoIP services
-- Voice services over Internet Protocol (VoIP) are nowadays much promoted by telecommunication and Internet service providers. However, the utilization of open networks, like the ...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...
108
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 1 months ago
Sparse Recovery by Non-convex Optimization -- Instance Optimality
In this note, we address the theoretical properties of p, a class of compressed sensing decoders that rely on p minimization with p (0, 1) to recover estimates of sparse and compr...
Rayan Saab, Özgür Yilmaz
CVIU
2010
104views more  CVIU 2010»
15 years 1 months ago
Pose estimation from multiple cameras based on Sylvester's equation
In this paper, we introduce a method to estimate the object's pose from multiple cameras. We focus on direct estimation of the 3D object pose from 2D image sequences. Scale-I...
Chong Chen, Dan Schonfeld