Sciweavers

105 search results - page 15 / 21
» Robust Authentication Using Physically Unclonable Functions
Sort
View
ICRA
2000
IEEE
141views Robotics» more  ICRA 2000»
14 years 1 months ago
An Analytical Method to Eliminate the Redundant Parameters in Robot Calibration
Model based error compensation of a robotic manipulator, also known as robot calibration, requires the identification of its generalized errors. These errors are found from measur...
Marco A. Meggiolaro, Steven Dubowsky
ISBRA
2007
Springer
14 years 2 months ago
Coclustering Based Parcellation of Human Brain Cortex Using Diffusion Tensor MRI
The fundamental goal of computational neuroscience is to discover anatomical features that reflect the functional organization of the brain. Investigations of the physical connect...
Cui Lin, Shiyong Lu, Danqing Wu, Jing Hua, Otto Mu...
DBSEC
2000
110views Database» more  DBSEC 2000»
13 years 10 months ago
Role-Based Security in a Distributed Resource Environment
There are many technologies for distributed processing/interoperation, including CORBA, DCE, DCOM, Enterprise Java Beans, Java IDL, JDBC, etc. Most promising, is the emergence of ...
Steven A. Demurjian, T. C. Ting, J. Balthazar, H. ...
ECCV
2008
Springer
14 years 10 months ago
Estimating 3D Trajectories of Periodic Motions from Stationary Monocular Views
We present a method for estimating the 3D trajectory of an object undergoing periodic motion in world coordinates by observing its apparent trajectory in a video taken from a singl...
Evan Ribnick, Nikolaos Papanikolopoulos
CVPR
2006
IEEE
14 years 8 days ago
Single-Image Vignetting Correction
In this paper, we propose a method for determining the vignetting function given only a single image. Our method is designed to handle both textured and untextured regions in orde...
Yuanjie Zheng, Stephen Lin, Sing Bing Kang