Sciweavers

28 search results - page 5 / 6
» Redundant image representations in security applications
Sort
View
ICCS
2009
Springer
14 years 3 months ago
Distinguishing Answers in Conceptual Graph Knowledge Bases
Abstract. In knowledge bases, the open world assumption and the ability to express variables may lead to an answer redundancy problem. This problem occurs when the returned answers...
Nicolas Moreau, Michel Leclère, Madalina Cr...
ISRR
2005
Springer
201views Robotics» more  ISRR 2005»
14 years 2 months ago
Advances in High Resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by the mismatch between available navigation as compared to sensor accuracy. In this paper we present ...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
IJRR
2007
236views more  IJRR 2007»
13 years 8 months ago
Towards High-resolution Imaging from Underwater Vehicles
Large area mapping at high resolution underwater continues to be constrained by sensor-level environmental constraints and the mismatch between available navigation and sensor acc...
Hanumant Singh, Christopher N. Roman, Oscar Pizarr...
MMSEC
2006
ACM
195views Multimedia» more  MMSEC 2006»
14 years 2 months ago
Image annotation watermarking: nested object embedding using hypergraph model
In this paper, we introduce to the special domain of image annotation watermarking, based on embedding of hierarchical data related to objects into user-selected areas on an image...
Claus Vielhauer, Maik Schott
ICMCS
2006
IEEE
112views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Where was the Picture Taken: Image Localization in Route Panoramas Using Epipolar Geometry
Finding the location where a picture was taken is an important problem for a variety of applications including surveying, interactive traveling and homeland security among others....
Saad M. Khan, Fahd Rafi, Mubarak Shah