Sciweavers

1214 search results - page 211 / 243
» Labeling Points with Weights
Sort
View
ICPR
2000
IEEE
14 years 2 months ago
Boundary Estimation from Intensity/Color Images with Algebraic Curve Models
A new concept and algorithm are presented for noniterative robust estimation of piecewise smooth curves of maximal edge strength in small image windows – typically  ¢¡£  to...
Tolga Tasdizen, David B. Cooper
ICRA
2000
IEEE
180views Robotics» more  ICRA 2000»
14 years 2 months ago
Interactive Motion Planning Using Hardware-Accelerated Computation of Generalized Voronoi Diagrams
We present techniques for fast motion planning by using discrete approximations of generalized Voronoi diagrams, computed with graphics hardware. Approaches based on this diagram ...
Kenneth E. Hoff III, Tim Culver, John Keyser, Ming...
ACISP
2000
Springer
14 years 2 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ICRA
1998
IEEE
121views Robotics» more  ICRA 1998»
14 years 2 months ago
Registering, Integrating and Building CAD Models from Range Data
In this paper, we introduce two methods for the registration of multiple range images when a prior estimate of the transformationbetween views is not available and the overlap bet...
Ruigang Yang, Peter K. Allen
ITC
1997
IEEE
129views Hardware» more  ITC 1997»
14 years 2 months ago
On Using Machine Learning for Logic BIST
This paper presents a new approach for designing test sequences to be generated on–chip. The proposed technique is based on machine learning, and provides a way to generate effi...
Christophe Fagot, Patrick Girard, Christian Landra...