Sciweavers

82 search results - page 9 / 17
» Texture-Consistent Shadow Removal
Sort
View
ATC
2007
Springer
14 years 4 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting g...
Emmanuel Bresson, Mark Manulis
SAINT
2008
IEEE
14 years 4 months ago
Detection of Pedestrians Using Subtraction Stereo
Abstract— In this paper, detection of pedestrians using “subtraction stereo” is discussed. Subtraction stereo is a stereo vision method that focuses on the movement of object...
Yuki Hashimoto, Yusuke Matsuki, Tatsuya Nakanishi,...
HPCC
2005
Springer
14 years 3 months ago
Correction of Building Height Effect Using LIDAR and GPS
Abstract. Correction of building height effects is a critical step in image interpretation from aerial imagery in urban area. In this paper, an efficient scheme to correct building...
Hong-Gyoo Sohn, Kong-Hyun Yun, Gi-Hong Kim, Hyo Su...
CVPR
2007
IEEE
14 years 11 months ago
Detector adaptation by maximising agreement between independent data sources
Traditional methods for creating classifiers have two main disadvantages. Firstly, it is time consuming to acquire, or manually annotate, the training collection. Secondly, the da...
Alan F. Smeaton, Ciarán O. Conaire, Noel E....
ICPR
2008
IEEE
14 years 11 months ago
GPS coordinate estimation from calibrated cameras
We present a novel application where, using only three points from the shadow trajectory of an object, one can accurately determine the geo-location of the camera, up to a longitu...
Hassan Foroosh, Imran N. Junejo