Sciweavers

1773 search results - page 179 / 355
» Depth from Diffusion
Sort
View
SPC
2005
Springer
14 years 2 months ago
Exploiting Empirical Engagement in Authentication Protocol Design
We develop the theme of an earlier paper [3], namely that security protocols for pervasive computing frequently need to exploit empirical channels and that the latter can be classi...
Sadie Creese, Michael Goldsmith, Richard Harrison,...
ICPR
2002
IEEE
14 years 2 months ago
Evaluating the Range Flow Motion Constraint
The instantaneous three-dimensional velocity field of a moving surface can be computed from a sequence of dense range data sets. Here we discuss the computation of the underlying...
Hagen Spies, John L. Barron
ICRA
1999
IEEE
145views Robotics» more  ICRA 1999»
14 years 1 months ago
Real Time Position Estimation for Mobile Robots by Means of Sonar Sensors
This paper presents a fast localisation algorithm for autonomous mobile agents in dynamic environments based on the definition of a new very small sized landmark type. These landm...
Cristina Urdiales, Antonio Bandera, R. Ron, Franci...
IPMI
1997
Springer
14 years 1 months ago
Automatic Detection of Sulcal Bottom Lines in MR Images of the Human Brain
This paper describes a.n automatic procedure for extracting sulcal bottom lines from MR (magnetic resonance) images of the human brain, which will serve as a tool for landmark extr...
Gabriele Lohmann, Frithjof Kruggel, D. Yves von Cr...
DAGM
2006
Springer
14 years 1 months ago
Analysis on a Local Approach to 3D Object Recognition
Abstract. We present a method for 3D object modeling and recognition which is robust to scale and illumination changes, and to viewpoint variations. The object model is derived fro...
Elisabetta Delponte, Elise Arnaud, Francesca Odone...