: A common technique hacker use is to route their traffic through a chain of stepping-stone hosts. It is generally agreed that there is no valid reason to use a long connection cha...
Wei Ding, Matthew J. Hausknecht, Shou-Hsuan Stephe...
Ultrasound Myocardial Elastography (UME) and Tagged Magnetic Resonance Imaging (tMRI) are two imaging modalities that were developed in the recent years to quantitatively estimate ...
Zhen Qian, Wei-Ning Lee, Elisa E. Konofagou, Dimit...
We propose a novel representation for characterizing image differences using a deformable technique for obtaining pixel-wise correspondences. This representation, which is based o...
We introduce a real-time stereo matching technique based on a reformulation of Yoon and Kweon’s adaptive support weights algorithm [1]. Our implementation uses the bilateral grid...
This paper proposes a technique for estimating piecewise planar models of objects from their images and geometric constraints. First, assuming a bounded noise in the localization ...