Browsing CAS: Computer Science: Technical Reports by Title

OpenBU

Browsing CAS: Computer Science: Technical Reports by Title

Sort by: Order: Results:

  • Stefan, Alexandra (Boston University Computer Science Department, 2008)
    Many real world image analysis problems, such as face recognition and hand pose estimation, involve recognizing a large number of classes of objects or shapes. Large margin methods, such as AdaBoost and Support Vector ...
  • Liu, Lifeng; Sclaroff, Stan (Boston University Computer Science Department, 2000-03-22)
    An improved method for deformable shape-based image indexing and retrieval is described. A pre-computed index tree is used to improve the speed of our previously reported on-line model fitting method; simple shape features ...
  • Bestavros, Azer; Byers, John; Harfoush, Khaled (Boston University Computer Science Department, 2001-05)
    The development and deployment of distributed network-aware applications and services over the Internet require the ability to compile and maintain a model of the underlying network resources with respect to (one or more) ...
  • Rosales, Romer; Sclaroff, Stan (Boston University Computer Science Department, 1999-12-01)
    A novel approach for estimating articulated body posture and motion from monocular video sequences is proposed. Human pose is defined as the instantaneous two dimensional configuration (i.e., the projection onto the image ...
  • Bakewell, Adam; Carlier, Sébastien; Kfoury, A. J.; Wells, J. B. (Boston University Computer Science Department, 2005-12-30)
    We present a procedure to infer a typing for an arbitrary λ-term M in an intersection-type system that translates into exactly the call-by-name (resp., call-by-value) evaluation of M. Our framework is the recently developed ...
  • Kfoury, A.J.; Stolboushkin, A.P. (Boston University Computer Science Department, 1996-08-15)
    We generalize the well-known pebble game to infinite dag's, and we use this generalization to give new and shorter proofs of results in different areas of computer science (as diverse as "logic of programs" and "formal ...
  • Morcos, Hany; Atia, George; Bestavros, Azer; Matta, Ibrahim (Boston University Computer Science Department, 2008-02-10)
    We consider a mobile sensor network monitoring a spatio-temporal field. Given limited cache sizes at the sensor nodes, the goal is to develop a distributed cache management algorithm to efficiently answer queries with a ...
  • Byers, John; Considine, Jeffrey; Mitzenmacher, Michael; Rost, Stanislav (Boston University Computer Science Department, 2002)
    Overlay networks have emerged as a powerful and highly flexible method for delivering content. We study how to optimize throughput of large, multipoint transfers across richly connected overlay networks, focusing on the ...
  • Duvos, Enrique; Bestavros, Azer (Boston University Computer Science Department, 2000-12-15)
    This paper presents the design and implementation of an infrastructure that enables any Web application, regardless of its current state, to be stopped and uninstalled from a particular server, transferred to a new server, ...
  • Alon, Jonathan; Sclaroff, Stan (Boston University Computer Science Department, 2000-12-04)
    Standard structure from motion algorithms recover 3D structure of points. If a surface representation is desired, for example a piece-wise planar representation, then a two-step procedure typically follows: in the first ...
  • Betke, Margrit; Wang, Jingbin; Ko, Jane P. (Boston University Computer Science Department, 2004-01-07)
    We introduce "BU-MIA," a Medical Image Analysis system that integrates various advanced chest image analysis methods for detection, estimation, segmentation, and registration. BU-MIA evaluates repeated computed tomography ...
  • Ocean, Michael J.; Kfoury, Assaf J.; Bestavros, Azer (Boston University Computer Science Department, 2006-09-16)
    The emergence of a sensor-networked world produces a clear and urgent need for well-planned, safe and secure software engineering. It is the role of universities to prepare graduates with the knowledge and experience to ...
  • Itkis, Gene; Maiss, Arwa (Boston University Computer Science Department, 2004-04-27)
    Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle" attack, etc.) can easily ...
  • Sclaroff, Stan; Del Bimbo, Alberto; Nunziati, Walter (Boston University Computer Science Department, 2005-05-19)
    We introduce a view-point invariant representation of moving object trajectories that can be used in video database applications. It is assumed that trajectories lie on a surface that can be locally approximated with a ...
  • Yuan, Quan; Sclaroff, Stan (Boston University Computer Science Department, 2009-07-12)
    A common design of an object recognition system has two steps, a detection step followed by a foreground within-class classification step. For example, consider face detection by a boosted cascade of detectors followed by ...
  • Diamant, Gali; Veytser, Leonid; Matta, Ibrahim; Bestavros, Azer; Guirguis, Mina; Guo, Liang; Zhang, Yuting; Chen, Sean (Boston University Computer Science Department, 2003-12-16)
    Internet Traffic Managers (ITMs) are special machines placed at strategic places in the Internet. itmBench is an interface that allows users (e.g. network managers, service providers, or experimental researchers) to register ...
  • Matta, Ibrahim; Riga, Niky; Medina, Alberto; Redi, Jason; Partridge, Craig (Boston University Computer Science Department, 2006-09-18)
    Within a recently developed low-power ad hoc network system, we present a transport protocol (JTP) whose goal is to reduce power consumption without trading off delivery requirements of applications. JTP has the following ...
  • Ablavsky, Vitaly; Thangali, Ashwin; Sclaroff, Stan (Boston University Computer Science Department, 2008-06)
    Partial occlusions are commonplace in a variety of real world computer vision applications: surveillance, intelligent environments, assistive robotics, autonomous navigation, etc. While occlusion handling methods have been ...
  • Ikizler-Cinbis, Nazli; Cinbis, Gokberk; Sclaroff, Stan (CS Department, Boston University, 2010-07-06)
    This paper proposes a generic method for action recognition in uncontrolled videos. The idea is to use images collected from the Web to learn representations of actions and use this knowledge to automatically annotate ...
  • Yuan, Quan (Boston University Computer Science Department, 2009-06-30)
    Object detection and recognition are important problems in computer vision. The challenges of these problems come from the presence of noise, background clutter, large within class variations of the object class and limited ...

Search OpenBU


Advanced Search

Browse

Deposit Materials