Sciweavers

582 search results - page 33 / 117
» Performance Comparison of Point and Spatial Access Methods
Sort
View
DPHOTO
2010
208views Hardware» more  DPHOTO 2010»
13 years 9 months ago
A signature analysis based method for elliptical shape
The high level context image analysis regards many fields as face recognition, smile detection, automatic red eye removal, iris recognition, fingerprint verification, etc. Techniq...
Ivana Guarneri, Mirko Guarnera, Giuseppe Messina, ...
ECCV
2008
Springer
14 years 9 months ago
Segmentation and Recognition Using Structure from Motion Point Clouds
We propose an algorithm for semantic segmentation based on 3D point clouds derived from ego-motion. We motivate five simple cues designed to model specific patterns of motion and 3...
Gabriel J. Brostow, Jamie Shotton, Julien Fauqueur...
ICCV
2001
IEEE
14 years 9 months ago
A Versatile Method for Trifocal Tensor Estimation
Reliable estimation of the trifocal tensor is crucial for 3D reconstruction from uncalibrated cameras. The estimation process is based on minimizing the geometric distances betwee...
Bogdan Matei, Bogdan Georgescu, Peter Meer
NOSSDAV
2010
Springer
14 years 13 days ago
Performance analysis of home streaming video using Orb
A new paradigm in video streaming is emerging, that of personal video servers in the home streaming video to remote clients on the Internet. The potential impact of such technolog...
Rabin Karki, Thangam Seenivasan, Mark Claypool, Ro...
WISEC
2010
ACM
14 years 2 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...