Sciweavers

3318 search results - page 485 / 664
» The Weak Instance Model
Sort
View
91
Voted
ADBIS
2006
Springer
109views Database» more  ADBIS 2006»
15 years 6 months ago
Content Is Capricious: A Case for Dynamic System Generation
Abstract. Database modeling is based on the assumption of a high regularity of its application areas, an assumption which applies to both the structure of data and the behavior of ...
Hans-Werner Sehring, Sebastian Bossung, Joachim W....
ICCV
2009
IEEE
16 years 3 months ago
Complete Multi-View Reconstruction of Dynamic Scenes from Probabilistic Fusion of Narrow and Wide Baseline Stereo
This paper presents a novel approach to achieve accurate and complete multi-view reconstruction of dynamic scenes (or 3D videos). 3D videos consist in sequences of 3D models in mot...
Tony Tung, Shohei Nobuhara, Takashi Matsuyama
CVPR
2008
IEEE
16 years 2 months ago
Regression from patch-kernel
In this paper, we present a patch-based regression framework for addressing the human age and head pose estimation problems. Firstly, each image is encoded as an ensemble of order...
Shuicheng Yan, Xi Zhou, Ming Liu, Mark Hasegawa-Jo...
QI
2009
Springer
117views Physics» more  QI 2009»
15 years 7 months ago
Generalising Unitary Time Evolution
In this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI as a field, arises in its continuing lack of models displaying...
Kirsty Kitto, Peter Bruza, Laurianne Sitbon
115
Voted
SACMAT
2009
ACM
15 years 7 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang