Sciweavers

3116 search results - page 102 / 624
» Recovering
Sort
View
ACISP
2000
Springer
14 years 1 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ECCV
2000
Springer
14 years 1 months ago
Approximate N-View Stereo
This paper introduces a new multi-view reconstruction problem called approximate N -view stereo. The goal of this problem is to recover a oneparameter family of volumes that are in...
Kiriakos N. Kutulakos
ICMCS
1999
IEEE
117views Multimedia» more  ICMCS 1999»
14 years 1 months ago
VHS to VRML: 3D Graphical Models from Video Sequences
Abstract-- We describe a method to completely automatically recover 3D scene structure together with a camera for each frame from a sequence of images acquired by an unknown camera...
Andrew Zisserman, Andrew W. Fitzgibbon, Geoffrey C...
ICMCS
1998
IEEE
86views Multimedia» more  ICMCS 1998»
14 years 1 months ago
Virtual Recovery of Excavated Archaeological Finds
This work aims at a virtual recovery of excavated archaeological finds in cyberspace for ancient relic preservation, archaeology research, and multimedia material generation. Many...
Jiang Yu Zheng, Zhong Li Zhang, Norihiro Abe
CVPR
1997
IEEE
14 years 1 months ago
Physically based fluid flow recovery from image sequences
This paper presents an approach to measuring fluid flow from image sequences. The approach centers around a motion recovery algorithm that is based on principles from fluid mechan...
Richard P. Wildes, Michael J. Amabile, Ann-Marie L...