Sciweavers

2871 search results - page 512 / 575
» An Auxiliary Variational Method
Sort
View
SI3D
2010
ACM
15 years 10 months ago
Fast capacity constrained Voronoi tessellation
Lloyd relaxation is widely employed to generate point distribution for a variety of applications in computer graphics, computer vision, and image processing. However, Lloyd relaxa...
Hongwei Li, Diego Nehab, Li-Yi Weiy, Pedro V. Sand...
CCECE
2009
IEEE
15 years 10 months ago
Inverse data transformation for change detection in wind turbine diagnostics
A complex system is expected to show different nominal behaviors under different conditions, and the deviation over time from these nominal behaviors is an indicator of potential ...
Yanjun Yan, Lisa Ann Osadciw, Glen Benson, Eric Wh...
SIBGRAPI
2009
IEEE
15 years 10 months ago
Nude Detection in Video Using Bag-of-Visual-Features
Abstract—The ability to filter improper content from multimedia sources based on visual content has important applications, since text-based filters are clearly insufficient a...
Ana Paula Brandão Lopes, Sandra E. F. de Av...
SLIP
2009
ACM
15 years 10 months ago
Predicting the worst-case voltage violation in a 3D power network
This paper proposes an efficient method to predict the worst case of voltage violation by multi-domain clock gating in a three-dimensional (3D) on-chip power network considering l...
Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shaya...
ICB
2007
Springer
156views Biometrics» more  ICB 2007»
15 years 10 months ago
Robust Extraction of Secret Bits from Minutiae
Abstract. Our goal is to extract consistent bits from the same fingerprint in a noisy environment. Such bits can then be used as a secret key in several cryptographic applications...
Ee-Chien Chang, Sujoy Roy