Sciweavers

1891 search results - page 366 / 379
» Constrained Subspace Modelling
Sort
View
MIR
2006
ACM
120views Multimedia» more  MIR 2006»
14 years 1 months ago
Scalable search-based image annotation of personal images
With the prevalence of digital cameras, more and more people have considerable digital images on their personal devices. As a result, there are increasing needs to effectively sea...
Changhu Wang, Feng Jing, Lei Zhang, HongJiang Zhan...
SENSYS
2006
ACM
14 years 1 months ago
Run-time dynamic linking for reprogramming wireless sensor networks
From experience with wireless sensor networks it has become apparent that dynamic reprogramming of the sensor nodes is a useful feature. The resource constraints in terms of energ...
Adam Dunkels, Niclas Finne, Joakim Eriksson, Thiem...
UIST
2006
ACM
14 years 1 months ago
A direct texture placement and editing interface
The creation of most models used in computer animation and computer games requires the assignment of texture coordinates, texture painting, and texture editing. We present a novel...
Yotam I. Gingold, Philip L. Davidson, Jefferson Y....
ICCV
2005
IEEE
14 years 1 months ago
Mutual Information-Based 3D Surface Matching with Applications to Face Recognition and Brain Mapping
Face recognition and many medical imaging applications require the computation of dense correspondence vector fields that match one surface with another. In brain imaging, surfac...
Yalin Wang, Ming-Chang Chiang, Paul M. Thompson
SP
2005
IEEE
105views Security Privacy» more  SP 2005»
14 years 1 months ago
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts
So far, sensor network broadcast protocols assume a trustworthy environment. However, in safety and missioncritical sensor networks this assumption may not be valid and some senso...
Jonathan M. McCune, Elaine Shi, Adrian Perrig, Mic...