Sciweavers

1663 search results - page 196 / 333
» Computer Security in the Real World
Sort
View
ICCV
2003
IEEE
16 years 6 months ago
Stochastic Refinement of the Visual Hull to Satisfy Photometric and Silhouette Consistency Constraints
An iterative method for reconstructing a 3D polygonal mesh and color texture map from multiple views of an object is presented. In each iteration, the method first estimates a tex...
John Isidoro, Stan Sclaroff
ICCV
1999
IEEE
16 years 6 months ago
Neurocalibration: A Neural Network That Can Tell Camera Calibration Parameters
Camera calibration is a primary crucial step in many computer vision tasks. In this paper we present a new neural approach for camera calibration. Unlike some existing neural appr...
Moumen T. Ahmed, Elsayed E. Hemayed, Aly A. Farag
ICDE
2008
IEEE
203views Database» more  ICDE 2008»
16 years 5 months ago
Training Linear Discriminant Analysis in Linear Time
Linear Discriminant Analysis (LDA) has been a popular method for extracting features which preserve class separability. It has been widely used in many fields of information proces...
Deng Cai, Xiaofei He, Jiawei Han
CHI
2004
ACM
16 years 4 months ago
Science at the Speed of Thought
Abstract. In this paper we describe a virtual laboratory that is designed to accelerate scientific exploration and discovery by minimizing the time between the generation of a scie...
Judith Ellen Devaney, Steven G. Satterfield, John ...
MOBIHOC
2008
ACM
16 years 3 months ago
Bubble rap: social-based forwarding in delay tolerant networks
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket S...
Pan Hui, Jon Crowcroft, Eiko Yoneki