Sciweavers

34181 search results - page 6513 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
SIGGRAPH
1996
ACM
15 years 9 months ago
Light Field Rendering
A number of techniques have been proposed for flying through scenes by redisplaying previously rendered or digitized views. Techniques have also been proposed for interpolating be...
Marc Levoy, Pat Hanrahan
ECCV
2010
Springer
15 years 9 months ago
Predicting Facial Beauty without Landmarks
A fundamental task in artificial intelligence and computer vision is to build machines that can behave like a human in recognizing a broad range of visual concepts. This paper aims...
ACCV
2009
Springer
15 years 8 months ago
People Tracking and Segmentation Using Efficient Shape Sequences Matching
Abstract. We design an effective shape prior embedded human silhouettes extraction algorithm. Human silhouette extraction is found challenging because of articulated structures, po...
Junqiu Wang, Yasushi Yagi, Yasushi Makihara
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 8 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
GLVLSI
2007
IEEE
194views VLSI» more  GLVLSI 2007»
15 years 8 months ago
Probabilistic maximum error modeling for unreliable logic circuits
Reliability modeling and evaluation is expected to be one of the major issues in emerging nano-devices and beyond 22nm CMOS. Such devices would have inherent propensity for gate f...
Karthikeyan Lingasubramanian, Sanjukta Bhanja
« Prev « First page 6513 / 6837 Last » Next »