Sciweavers

1955 search results - page 69 / 391
» Can Computers Handle Adverbs
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
15 years 4 months ago
Modeling Adversaries in a Logic for Security Protocol Analysis
Logics for security protocol analysis require the formalization of an adversary model that specifies the capabilities of adversaries. A common model is the Dolev-Yao model, which c...
Joseph Y. Halpern, Riccardo Pucella
CVPR
2008
IEEE
16 years 6 months ago
Symmetric multi-view stereo reconstruction from planar camera arrays
We present a novel stereo algorithm which performs surface reconstruction from planar camera arrays. It incorporates the merits of both generic camera arrays and rectified binocul...
Matthieu Maitre, Yoshihisa Shinagawa, Minh N. Do
ECCV
2002
Springer
16 years 6 months ago
Multi-camera Scene Reconstruction via Graph Cuts
We address the problem of computing the 3-dimensional shape of an arbitrary scene from a set of images taken at known viewpoints. Multi-camera scene reconstruction is a natural gen...
Vladimir Kolmogorov, Ramin Zabih
MP
1998
73views more  MP 1998»
15 years 3 months ago
On proving existence of feasible points in equality constrained optimization problems
Various algorithms can compute approximate feasible points or approximate solutions to equality and bound constrained optimization problems. In exhaustive search algorithms for gl...
R. Baker Kearfott
ICPR
2008
IEEE
16 years 5 months ago
Image mosaicing using local optical flow registration
Cylindrical panoramic mosaics can be created by aligning and stitching images from a series, captured by a camera rotating around its optical center. The transformation between tw...
François Deschênes, Marie Flavie Aucl...