Sciweavers

1051 search results - page 133 / 211
» Single Run Optimization Using the Reverse-Simulation Method
Sort
View
FOCS
2008
IEEE
15 years 4 months ago
Matrix Sparsification for Rank and Determinant Computations via Nested Dissection
The nested dissection method developed by Lipton, Rose, and Tarjan is a seminal method for quickly performing Gaussian elimination of symmetric real positive definite matrices who...
Raphael Yuster
167
Voted
CVPR
2005
IEEE
16 years 6 months ago
Robust and Efficient Foreground Analysis for Real-Time Video Surveillance
We present a new method to robustly and efficiently analyze foreground when we detect background for a fixed camera view by using mixture of Gaussians models and multiple cues. Th...
Ying-li Tian, Max Lu, Arun Hampapur
IH
2007
Springer
15 years 10 months ago
Imaging Sensor Noise as Digital X-Ray for Revealing Forgeries
In this paper, we describe a new forensic tool for revealing digitally altered images by detecting the presence of photo-response non-uniformity noise (PRNU) in small regions. This...
Mo Chen, Jessica J. Fridrich, Jan Lukás, Mi...
FQAS
2004
Springer
122views Database» more  FQAS 2004»
15 years 8 months ago
Simplification of Integrity Constraints with Aggregates and Arithmetic Built-Ins
In the context of relational as well as deductive databases, correct and efficient integrity checking is a crucial issue, as, without any guarantee of data consistency, the answers...
Davide Martinenghi
FMCAD
2008
Springer
15 years 6 months ago
Recording Synthesis History for Sequential Verification
Performing synthesis and verification in isolation has two undesirable consequences: (1) verification runs the risk of becoming intractable, and (2) strong sequential optimization...
Alan Mishchenko, Robert K. Brayton