Sciweavers

2715 search results - page 388 / 543
» Total Generalized Variation
Sort
View
122
Voted
CGO
2006
IEEE
15 years 7 months ago
2D-Profiling: Detecting Input-Dependent Branches with a Single Input Data Set
Static compilers use profiling to predict run-time program behavior. Generally, this requires multiple input sets to capture wide variations in run-time behavior. This is expensiv...
Hyesoon Kim, M. Aater Suleman, Onur Mutlu, Yale N....
115
Voted
CHES
2006
Springer
111views Cryptology» more  CHES 2006»
15 years 7 months ago
Cache-Collision Timing Attacks Against AES
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified ...
Joseph Bonneau, Ilya Mironov
163
Voted
FGR
2004
IEEE
230views Biometrics» more  FGR 2004»
15 years 7 months ago
Tracking Humans using Prior and Learned Representations of Shape and Appearance
Tracking a moving person is challenging because a person's appearance in images changes significantly due to articulation, viewpoint changes, and lighting variation across a ...
Jongwoo Lim, David J. Kriegman
FGR
2004
IEEE
131views Biometrics» more  FGR 2004»
15 years 7 months ago
Active Morphable Model: An Efficient Method for Face Analysis
Multidimensional Morphable Model is a powerful model to analyze and synthesize human faces. However, the stochastic gradient descent algorithm adopted to match the Morphable Model...
Xun Xu, Changshui Zhang, Thomas S. Huang
DAGM
2006
Springer
15 years 7 months ago
Diffusion-Like Reconstruction Schemes from Linear Data Models
In this paper we extend anisotropic diffusion with a diffusion tensor to be applicable to data that is well modeled by linear models. We focus on its variational theory, and invest...
Hanno Scharr