Sciweavers

103 search results - page 15 / 21
» K -Trivial Closed Sets and Continuous Functions
Sort
View
ICIP
2008
IEEE
14 years 2 months ago
Reliable interest point detection under large illumination variations
This appendix proves the illumination robustness of the proposed corner detector over the Harris corner detector. I. HARRIS CORNER DETECTOR The Harris corner detector [1] is based...
Murat Gevrekci, Bahadir K. Gunturk
MMDB
2003
ACM
178views Multimedia» more  MMDB 2003»
14 years 26 days ago
Video query processing in the VDBMS testbed for video database research
The increased use of video data sets for multimedia-based applications has created a demand for strong video database support, including efficient methods for handling the content...
Walid G. Aref, Moustafa A. Hammad, Ann Christine C...
NETWORK
2011
13 years 2 months ago
Inferring video QoE in real time
Inferring the subjective perception of a video stream in real time continues to be a stiff problem. This article presents MintMOS: a lightweight, no-reference, loadable kernel mod...
Mukundan Venkataraman, Mainak Chatterjee
IJRR
2007
104views more  IJRR 2007»
13 years 7 months ago
Deep Space Formation Flying Spacecraft Path Planning
Efficient algorithms for collision-free energy sub-optimal path planning for formations of spacecraft flying in deep space are presented. The idea is to introduce a set of way-poi...
Cornel Sultan, Sanjeev Seereeram, Raman K. Mehra
CCS
2009
ACM
14 years 2 months ago
A probabilistic approach to hybrid role mining
Role mining algorithms address an important access control problem: configuring a role-based access control system. Given a direct assignment of users to permissions, role mining...
Mario Frank, Andreas P. Streich, David A. Basin, J...