Sciweavers

944 search results - page 152 / 189
» An evaluation of image based steganography methods
Sort
View
ICCV
2007
IEEE
14 years 10 months ago
Real-Time Visibility-Based Fusion of Depth Maps
We present a viewpoint-based approach for the quick fusion of multiple stereo depth maps. Our method selects depth estimates for each pixel that minimize violations of visibility ...
Paul Merrell, Amir Akbarzadeh, Liang Wang, Philipp...
AINA
2007
IEEE
14 years 2 months ago
Data Stream Based Algorithms For Wireless Sensor Network Applications
Abstract— A wireless sensor network (WSN) is energy constrained, and the extension of its lifetime is one of the most important issues in its design. Usually, a WSN collects a la...
André L. L. de Aquino, Carlos Mauricio S. F...
MM
2005
ACM
99views Multimedia» more  MM 2005»
14 years 2 months ago
To learn representativeness of video frames
With the rapid explosion of video data, compact representation of videos is becoming more and more desirable for efficient browsing and communication, which leads to a number of r...
Hong-Wen Kang, Xian-Sheng Hua
TOG
2010
134views more  TOG 2010»
13 years 3 months ago
Unbiased, adaptive stochastic sampling for rendering inhomogeneous participating media
Realistic rendering of participating media is one of the major subjects in computer graphics. Monte Carlo techniques are widely used for realistic rendering because they provide u...
Yonghao Yue, Kei Iwasaki, Bing-Yu Chen, Yoshinori ...
ICPR
2008
IEEE
14 years 9 months ago
Using web search engines to improve text recognition
In this paper we introduce a framework for automated text recognition from images. We first describe a simple but efficient text detection and recognition method based on analysis...
Horst Bischof, Michael Donoser, Silke Wagner