Sciweavers

953 search results - page 139 / 191
» Constraint Based Transformation Theory
Sort
View
CIVR
2007
Springer
173views Image Analysis» more  CIVR 2007»
14 years 3 months ago
Fast and cheap object recognition by linear combination of views
In this paper, we present a real-time algorithm for 3D object detection in images. Our method relies on the Ullman and Basri [13] theory which claims that the same object under di...
Jérome Revaud, Guillaume Lavoué, Yas...
VRST
2004
ACM
14 years 3 months ago
Modeling and rendering of walkthrough environments with panoramic images
An important, potential application of image-based techniques is to create photo-realistic image-based environments for interactive walkthrough. However, existing image-based stud...
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 2 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
CSFW
1999
IEEE
14 years 2 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
CORR
2007
Springer
83views Education» more  CORR 2007»
13 years 9 months ago
Simulation of Phase Combinations in Shape Memory Alloys Patches by Hybrid Optimization Methods
In this paper, phase combinations among martensitic variants in shape memory alloys patches and bars are simulated by a hybrid optimization methodology. The mathematical model is ...
Linxiang X. Wang, Roderick V. N. Melnik