Sciweavers

7810 search results - page 1528 / 1562
» Evaluating Image Retrieval
Sort
View
ICRA
2008
IEEE
148views Robotics» more  ICRA 2008»
14 years 2 months ago
Visual saliency model for robot cameras
— Recent years have seen an explosion of research on the computational modeling of human visual attention in task free conditions, i.e., given an image predict where humans are l...
Nicholas J. Butko, Lingyun Zhang, Garrison W. Cott...
3DIM
2007
IEEE
14 years 2 months ago
Cached k-d tree search for ICP algorithms
The ICP (Iterative Closest Point) algorithm is the de facto standard for geometric alignment of threedimensional models when an initial relative pose estimate is available. The ba...
Andreas Nüchter, Kai Lingemann, Joachim Hertz...
3DIM
2007
IEEE
14 years 2 months ago
Light stripe triangulation for multiple of moving rigid objects
In this paper, we propose an extension of light stripe triangulation for multiple of moving rigid objects. With traditional light stripe triangulation, the acquired shape of movin...
Takuya Funatomi, Masaaki Iiyama, Koh Kakusho, Mich...
CLUSTER
2007
IEEE
14 years 2 months ago
Balancing productivity and performance on the cell broadband engine
— The Cell Broadband Engine (BE) is a heterogeneous multicore processor, combining a general-purpose POWER architecture core with eight independent single-instructionmultiple-dat...
Sadaf R. Alam, Jeremy S. Meredith, Jeffrey S. Vett...
SP
2007
IEEE
14 years 2 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
« Prev « First page 1528 / 1562 Last » Next »