Learn More
We introduce a technique that allows 3D information to be captured from a conventional flatbed scanner. The technique requires no hardware modification and allows untrained users to easily capture 3D datasets. Once captured, these datasets can be used for interactive relighting and enhancement of surface detail on physical objects. We have also found that(More)
All-Optical Networks provide ultra-fast data rates, but present a new set of challenges for network security. We present a new algorithm for attack localization in networks. The algorithm is distributed and requires only local information. The algorithm can localize attacks for a variety of network applications. This algorithm is particularly well suited to(More)
A key element of the CoolAgent Personal Assistant vision is the active management and use of personal, team and organizational information. The finding, filtering, composing, routing and information-triggered notification to a (mobile) user, adapted to the location, schedule, available appliances, tasks and other personal and team context is a key(More)
texture detection, texture analysis, texture synthesis, image analysis An algorithm is presented for the detection of textured areas in digital images. Texture detection has potential application to image enhancement, tone correction, defect detection, content classification and image segmentation. For example, texture detection may be combined with a color(More)
One of the most important aspects of a good image is that the subject looks good. It is therefore our objective, when building an automatic image enhancement system, to optimize the appearance of the image subject(s). Moreover, people often have specific preferences regarding the look of different objects. Grass, for example, is considered prettier when(More)
—With the advent of the Internet, it is desirable to interpret and extract useful information from the Web. One major challenge in Web interface interpretation is to discover the semantic structure underlying a Web interface. Many heuristic approaches have been developed to discover and group semantically related interface objects. However, those approaches(More)
—A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their interrelationships. Mining such graphs is challenging because they are large, complex, and multi-attributed, and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the(More)
A configuration management database (CMDB) can be considered to be a large graph representing the IT infrastructure entities and their interrelationships. Mining such graphs is challenging because they are large, complex, and multi-attributed and have many repeated labels. These characteristics pose challenges for graph mining algorithms, due to the(More)