Please note that IST Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).

We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.

6304 Publications


2006 | Journal Article | IST-REx-ID: 3185
Kolmogorov, V., Criminisi, A., Blake, A., Cross, G., & Rother, C. (2006). Probabilistic fusion of stereo with color and contrast for bilayer segmentation. IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE. https://doi.org/10.1109/TPAMI.2006.193
View | DOI | Download (ext.)
 

2006 | Conference Paper | IST-REx-ID: 3186
Boykov, Y., Kolmogorov, V., Cremers, D., & Delong, A. (2006). An integral solution to surface evolution PDEs via geo cuts (Vol. 3953, pp. 409–422). Presented at the ECCV: European Conference on Computer Vision, Springer. https://doi.org/10.1007/11744078_32
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3188
Rother, C., Kolmogorov, V., Minka, T., & Blake, A. (2006). Cosegmentation of image pairs by histogram matching - Incorporating a global constraint into MRFs (pp. 993–1000). Presented at the CVPR: Computer Vision and Pattern Recognition, IEEE. https://doi.org/10.1109/CVPR.2006.91
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3189
Criminisi, A., Cross, G., Blake, A., & Kolmogorov, V. (2006). Bilayer segmentation of live video (Vol. 1, pp. 53–60). Presented at the CVPR: Computer Vision and Pattern Recognition, IEEE. https://doi.org/10.1109/CVPR.2006.69
View | DOI | Download (ext.)
 

2006 | Journal Article | IST-REx-ID: 3190
Kolmogorov, V. (2006). Convergent tree reweighted message passing for energy minimization. IEEE Transactions on Pattern Analysis and Machine Intelligence. IEEE. https://doi.org/10.1109/TPAMI.2006.200
View | DOI | Download (ext.)
 

2006 | Conference Paper | IST-REx-ID: 3214
Maurer, U., Oswald, Y., Pietrzak, K. Z., & Sjödin, J. (2006). Luby Rackoff ciphers from weak round functions (Vol. 4004, pp. 391–408). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_24
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3215
Dodis, Y., Pietrzak, K. Z., & Przydatek, B. (2006). Separating sources for encryption and secret sharing (Vol. 3876, pp. 601–616). Presented at the TCC: Theory of Cryptography Conference, Springer. https://doi.org/10.1007/11681878_31
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3216
Pietrzak, K. Z. (2006). A tight bound for EMAC (Vol. 4052, pp. 168–179). Presented at the ICALP: Automata, Languages and Programming, Springer. https://doi.org/10.1007/11787006_15
View | DOI
 

2006 | Conference Paper | IST-REx-ID: 3217
Pietrzak, K. Z. (2006). Composition implies adaptive security in minicrypt (Vol. 4004, pp. 328–338). Presented at the EUROCRYPT: Theory and Applications of Cryptographic Techniques, Springer. https://doi.org/10.1007/11761679_20
View | DOI
 

2006 | Book Chapter | IST-REx-ID: 3404
Janovjak, H. L., Sawhney, R., Stark, M., & Mueller, D. (2006). Atomic force microscopy. In Techniques in Microscopy for Biomedical Applications (Vol. 2, pp. 213–284). World Scientific Publishing.
View
 

Search

Filter Publications