Sciweavers

977 search results - page 117 / 196
» Soft Constraints for Security
Sort
View
ICCV
2009
IEEE
16 years 3 months ago
Beyond Connecting the Dots: A Polynomial-time Algorithm for Segmentation and Boundary Estimation with Imprecise User Input
We propose a polynomial-time algorithm for segmentation and (open) boundary estimation which takes into account a series of user-specified attraction points. In contrast to exis...
Thomas Windheuser, Thomas Schoenemann, Daniel Crem...
ICCV
2007
IEEE
16 years 10 hour ago
A Geodesic Framework for Fast Interactive Image and Video Segmentation and Matting
An interactive framework for soft segmentation and matting of natural images and videos is presented in this paper. The proposed technique is based on the optimal, linear time, co...
Xue Bai, Guillermo Sapiro
MICCAI
2009
Springer
15 years 11 months ago
Dynamic Cone Beam Reconstruction Using a New Level Set Formulation
Abstract. This paper addresses an approach toward tomographic reconstruction from rotational angiography data as it is generated by Carms in cardiac imaging. Since the rotational a...
Andreas Keil, Jakob Vogel, Günter Lauritsch, ...
DAC
2008
ACM
15 years 11 months ago
Cache modeling in probabilistic execution time analysis
Multimedia-dominated consumer electronics devices (such as cellular phone, digital camera, etc.) operate under soft real-time constraints. Overly pessimistic worst-case execution ...
Yun Liang, Tulika Mitra
DAC
2001
ACM
15 years 11 months ago
MetaCores: Design and Optimization Techniques
Currently, hardware intellectual property (IP) is delivered at vels of abstraction: hard, firm, and soft. In order to further enhance performance, efficiency, and flexibility of I...
Seapahn Meguerdichian, Farinaz Koushanfar, Advait ...