- Fei-Fei, L., Perona, P. A Bayesian hierarchical model for learning natural scene categories. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2005), 524-531. Google ScholarDigital Library
- Heeger, D., Bergen, J.R. Pyramidbased texture analysis/synthesis. In SIGGRAPH '95: Proceedings of the 22nd Annual Conference on Computer Graphics and Interactive Techniques (New York, USA, 1995). ACM, NY, 229-238. Google ScholarDigital Library
- Hoiem, D., Efros, A., Hebert, M. Geometric context from a single image. In IEEE International Conference on Computer Vision (2005). Google ScholarDigital Library
- Jordan, M.I., Jacobs, R.A. Herarchical mixtures of experts and the EM algorithm. Neural Computation, 6 (1994), 181-214. Google ScholarDigital Library
- Koller, D., Friedman, N. Probabilistic Graphical Models: Principles and Techniques. MIT Press, 2009. Google ScholarDigital Library
- Kumar, S., Hebert, M. Discriminative random fields: A discriminative framework for contextual interaction in classification. In IEEE International Conference on Computer Vision (2003). Google ScholarDigital Library
- Lazebnik, S., Schmid, C., Ponce, J. Beyond bags of features: Spatial pyramid matching for recognizing natural scene categories. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2006), 2169-2178. Google ScholarDigital Library
- Murphy, K., Torralba, A., Eaton, D., Freeman, W.T. Object detection and localization using local and global features. Toward Category-Level Object Recognition. J. Ponce, M. Hebert, C. Schmidt, and A. Zisserman, eds. 2006.Google Scholar
- Murphy, K., Torralba, A., Freeman, W. Using the forest to see the trees: a graphical model relating features, objects and scenes. In Advances in Neural Information Proceedings Systems (2003).Google Scholar
- Oliva, A., Schyns, P.G. Diagnostic color blobs mediate scene recognition. Cogn. Psychol. 41 (2000), 176-210.Google ScholarCross Ref
- Oliva, A., Torralba, A. Modeling the shape of the scene: A holistic representation of the spatial envelope. Int. J. Comp. Vision 42 (2001), 145-175. Google ScholarDigital Library
- Quattoni, A., Torralba, A. Recognizing indoor scenes. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2009), 413-420.Google ScholarCross Ref
- Rabinovich, A., Vedaldi, A., Galleguillos, C., Wiewiora, E., Belongie, S. Objects in context. In IEEE International Conference on Computer Vision (Rio de Janeiro, 2007).Google ScholarCross Ref
- Richard, X.H., Zemel, R.S., Carreiraperpinan, M.A. Multiscale conditional random fields for image labeling. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition (2004), 695-702. Google ScholarDigital Library
- Russell, B.C., Torralba, A., Murphy, K.P., Freeman, W.T. LabelMe: a database and web-based tool for image annotation. Int. J. Comp. Vision 77, 1-3 (2008), 157-173. Google ScholarDigital Library
- Strat, T.M., Fischler, M.A. Contextbased vision: recognizing objects using information from both 2-D and 3-D imagery. IEEE Transaction on Pattern Analysis and Machine Intelligence 13, 10 (1991) 1050-1065. Google ScholarDigital Library
- Torralba, A. Contextual priming for object detection. Int. J. Comp. Vision 53, 2 (2003), 153-167. Google ScholarDigital Library
- Torralba, A., Murphy, K., Freeman, W. Contextual models for object detection using boosted random fields. In Advances in Neural Information Proceedings Systems (2004).Google Scholar
- Torralba, A., Murphy, K.P., Freeman, W.T. Sharing visual features for multiclass and multiview object detection. IEEE Trans. Pattern Anal. Mach. Intell. 29, 5 (2007), 854-869. Google ScholarDigital Library
- Viola, P., Jones, M. Robust real-time object detection. Int. J. Comp. Vision 57, 2 (2004), 137-154. Google ScholarDigital Library
Index Terms
- A first glimpse of cryptography's Holy Grail
Recommendations
Fully Homomorphic Encryption: Cryptography's holy grail
CryptographyFor more than 30 years, cryptographers have embarked on a quest to construct an encryption scheme that would enable arbitrary computation on encrypted data. Conceptually simple, yet notoriously difficult to achieve, cryptography's holy grail opens the ...
Identity-Based signcryption from identity-based cryptography
WISA'11: Proceedings of the 12th international conference on Information Security ApplicationsA signcryption scheme encrypts and signs data in a single operation which is more efficient than using an encryption scheme combined with a signature scheme. Identity-based cryptography (IBC) does not require users to pre-compute key pairs and obtain ...
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original signer. Recently, in order to eliminate the use of certificates in certified ...
Comments