Sciweavers

1736 search results - page 305 / 348
» String Extension Learning
Sort
View
CVPR
2012
IEEE
13 years 22 days ago
Seeded watershed cut uncertainty estimators for guided interactive segmentation
Watershed cuts are among the fastest segmentation algorithms and therefore well suited for interactive segmentation of very large 3D data sets. To minimize the number of user inte...
Christoph N. Straehle, Ullrich Köthe, Graham ...
CVPR
2012
IEEE
13 years 22 days ago
Boosting bottom-up and top-down visual features for saliency estimation
Despite significant recent progress, the best available visual saliency models still lag behind human performance in predicting eye fixations in free-viewing of natural scenes. ...
Ali Borji
PKC
2012
Springer
279views Cryptology» more  PKC 2012»
13 years 22 days ago
Circular and KDM Security for Identity-Based Encryption
We initiate the study of security for key-dependent messages (KDM), sometimes also known as “circular” or “clique” security, in the setting of identity-based encryption (I...
Jacob Alperin-Sheriff, Chris Peikert
SIGUCCS
2003
ACM
15 years 3 months ago
WebDAV: what it is, what it does, why you need it
Legacy network file services such as NFS, SMB/CIFS, and AFP changed the way we worked. File services running on crossplatform networks allowed us to save our files on remote syste...
Luis O. Hernández, Mahmoud Pegah
ICDE
2009
IEEE
251views Database» more  ICDE 2009»
16 years 1 days ago
Contextual Ranking of Keywords Using Click Data
The problem of automatically extracting the most interesting and relevant keyword phrases in a document has been studied extensively as it is crucial for a number of applications. ...
Utku Irmak, Vadim von Brzeski, Reiner Kraft