Sciweavers

184 search results - page 16 / 37
» The Meaning of Logs
Sort
View
IJCV
1998
168views more  IJCV 1998»
14 years 11 months ago
Rapid Anisotropic Diffusion Using Space-Variant Vision
Many computer and robot vision applications require multi-scale image analysis. Classically, this has been accomplished through the use of a linear scale-space, which is constructe...
Bruce Fischl, Michael A. Cohen, Eric L. Schwartz
PODC
2011
ACM
14 years 2 months ago
Robust network supercomputing without centralized control
Internet supercomputing is becoming an increasingly popular means for harnessing the power of a vast number of interconnected computers. This comes at a cost substantially lower t...
Seda Davtyan, Kishori M. Konwar, Alexander A. Shva...
NDSS
1999
IEEE
15 years 4 months ago
Secure Password-Based Protocol for Downloading a Private Key
We present protocols that allow a user Alice, knowing only her name and password, and not carrying a smart card, to "log in to the network" from a "generic" wo...
Radia J. Perlman, Charlie Kaufman
97
Voted
ISAAC
2007
Springer
135views Algorithms» more  ISAAC 2007»
15 years 6 months ago
Fast Evaluation of Union-Intersection Expressions
Abstract. We show how to represent sets in a linear space data structure such that expressions involving unions and intersections of sets can be computed in a worst-case efficient ...
Philip Bille, Anna Pagh, Rasmus Pagh
BMVC
2010
14 years 9 months ago
Background Modelling on Tensor Field for Foreground Segmentation
The paper proposes a new method to perform foreground detection by means of background modeling using the tensor concept. Sometimes, statistical modelling directly on image values...
Rui Caseiro, Jorge Batista, Pedro Martins