Sciweavers

33 search results - page 4 / 7
» Set Covering with our Eyes Closed
Sort
View
CVPR
2008
IEEE
15 years 11 months ago
Precise detailed detection of faces and facial features
Face detection has advanced dramatically over the past three decades. Algorithms can now quite reliably detect faces in clutter in or near real time. However, much still needs to ...
Liya Ding, Aleix M. Martínez
CCCG
2007
14 years 11 months ago
Generalized Watchman Route Problem with Discrete View Cost
In this paper, we introduce a generalized version of the Watchman Route Problem (WRP) where the objective is to plan a continuous closed route in a polygon (possibly with holes) a...
Pengpeng Wang, Ramesh Krishnamurti, Kamal Gupta
EDBT
2012
ACM
254views Database» more  EDBT 2012»
12 years 11 months ago
Inside "Big Data management": ogres, onions, or parfaits?
In this paper we review the history of systems for managing “Big Data” as well as today’s activities and architectures from the (perhaps biased) perspective of three “data...
Vinayak R. Borkar, Michael J. Carey, Chen Li
WCRE
2008
IEEE
15 years 3 months ago
Retrieving Task-Related Clusters from Change History
During software maintenance tasks, developers often spend an important amount of effort investigating source code. This effort can be reduced if tools are available to help develo...
Martin P. Robillard, Barthélémy Dage...
CADE
2008
Springer
15 years 9 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen