Sciweavers

2109 search results - page 317 / 422
» Solving Necklace Constraint Problems
Sort
View
PPDP
2005
Springer
15 years 10 months ago
Security policy in a declarative style
We address the problem of controlling information leakage in a concurrent declarative programming setting. Our aim is to define verification tools in order to distinguish betwee...
Rachid Echahed, Frédéric Prost
3DIM
2003
IEEE
15 years 9 months ago
Human Figure Reconstruction and Modeling from Single Image or Monocular Video Sequence
In this contribution we firstly review some approaches to recover the 3D shape of human figures and the related movements. Then we present an improved and reliable version of an e...
Fabio Remondino, Andreas Roditakis
PG
2003
IEEE
15 years 9 months ago
Bounding Recursive Procedural Models Using Convex Optimization
We present an algorithm to construct a tight bounding polyhedron for a recursive procedural model. We first use an iterated function system (IFS) to represent the extent of the p...
Orion Sky Lawlor, John C. Hart
ISAAC
2003
Springer
144views Algorithms» more  ISAAC 2003»
15 years 9 months ago
Biconnectivity on Symbolically Represented Graphs: A Linear Solution
Abstract. We define an algorithm for determining, in a linear number of symbolic steps, the biconnected components of a graph implicitly represented with Ordered Binary Decision D...
Raffaella Gentilini, Alberto Policriti
145
Voted
ICPR
2002
IEEE
15 years 9 months ago
A Robust Algorithm for Probabilistic Human Recognition From
Human recognition from video requires solving the two tasks, recognition and tracking, simultaneously. This leads to a parameterized time series state space model, representing bo...
Shaohua Kevin Zhou, Rama Chellappa