Sciweavers

1663 search results - page 259 / 333
» Computer Security in the Real World
Sort
View
ICIP
2005
IEEE
15 years 9 months ago
Automatic registration of 3D datasets using Gaussian fields
—In this paper we introduce a new 3D automatic registration method based on Gaussian fields and energy minimization. The method defines a simple ∞ C energy function, which is c...
Faysal Boughorbel, Andreas Koschan, Mongi A. Abidi
KBSE
2005
IEEE
15 years 9 months ago
Automated population of causal models for improved software risk assessment
Recent work in applying causal modeling (Bayesian networks) to software engineering has resulted in improved decision support systems for software project managers. Once the causa...
Peter Hearty, Norman E. Fenton, Martin Neil, Patri...
WACV
2005
IEEE
15 years 9 months ago
Multi-Scale 3D Scene Flow from Binocular Stereo Sequences
Scene flow methods estimate the three-dimensional motion field for points in the world, using multi-camera video data. Such methods combine multi-view reconstruction with motion...
Rui Li, Stan Sclaroff
106
Voted
HT
2005
ACM
15 years 9 months ago
Constraints in spatial structures
People have become used to paper as an information carrier over thousands of years. Paper is usually easy to handle and has been adopted as a metaphor for information structures i...
Claus Atzenbeck, Peter J. Nürnberg
MM
2005
ACM
93views Multimedia» more  MM 2005»
15 years 9 months ago
The multimedia challenges raised by pervasive games
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devic...
Mauricio Capra, Milena Radenkovic, Steve Benford, ...