Sciweavers

2311 search results - page 348 / 463
» Robustness and Generalization
Sort
View
TCSV
2008
124views more  TCSV 2008»
15 years 4 months ago
A Novel Look-Up Table Design Method for Data Hiding With Reduced Distortion
Look-up table (LUT)-based data hiding is a simple and efficient technique to hide secondary information (watermark) into multimedia work for various applications such as copyright ...
Xiao-Ping Zhang, Kan Li, Xiaofeng Wang
TIFS
2008
145views more  TIFS 2008»
15 years 4 months ago
Physical-Layer Authentication
Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, t...
Paul L. Yu, John S. Baras, Brian M. Sadler
TIP
2008
344views more  TIP 2008»
15 years 4 months ago
A Self-Organizing Approach to Background Subtraction for Visual Surveillance Applications
Detection of moving objects in video streams is the first relevant step of information extraction in many computer vision applications. Aside from the intrinsic usefulness of being...
Lucia Maddalena, Alfredo Petrosino
TOG
2008
156views more  TOG 2008»
15 years 4 months ago
Real-time motion retargeting to highly varied user-created morphologies
Character animation in video games--whether manually keyframed or motion captured--has traditionally relied on codifying skeletons early in a game's development, and creating...
Chris Hecker, Bernd Raabe, Ryan W. Enslow, John De...
CAGD
2005
93views more  CAGD 2005»
15 years 4 months ago
Simple local interpolation of surfaces using normal vectors
A simple algorithm for surface interpolation is proposed. Its central idea is quadratic interpolation of a curved segment from the position and normal vectors at the end points, w...
Takashi Nagata