Sciweavers

3579 search results - page 671 / 716
» Transformations of software models into performance models
Sort
View
132
Voted
ECCV
2004
Springer
16 years 5 months ago
Dimensionality Reduction by Canonical Contextual Correlation Projections
A linear, discriminative, supervised technique for reducing feature vectors extracted from image data to a lower-dimensional representation is proposed. It is derived from classica...
Marco Loog, Bram van Ginneken, Robert P. W. Duin
152
Voted
ECCV
2004
Springer
16 years 5 months ago
Towards Intelligent Mission Profiles of Micro Air Vehicles: Multiscale Viterbi Classification
In this paper, we present a vision system for object recognition in aerial images, which enables broader mission profiles for Micro Air Vehicles (MAVs). The most important factors ...
Sinisa Todorovic, Michael C. Nechyba
145
Voted
ECCV
2006
Springer
16 years 5 months ago
Triangulation for Points on Lines
Triangulation consists in finding a 3D point reprojecting the best as possible onto corresponding image points. It is classical to minimize the reprojection error, which, in the p...
Adrien Bartoli, Jean-Thierry Lapresté
119
Voted
ICIP
2008
IEEE
16 years 5 months ago
Automatic liver tumor diagnosis with Dynamic-Contrast Enhanced MRI
Dynamic-Contrast Enhanced MRI (DCE-MRI) is currently used as a complementary diagnosis tool to assess the malignancy of the liver tumor, called hepatoma, hepatocarcinoma, hepatoce...
Liliana Caldeira, Isabela Silva, João Sanch...
118
Voted
CTRSA
2009
Springer
151views Cryptology» more  CTRSA 2009»
15 years 10 months ago
Key-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as lit...
Giuseppe Ateniese, Karyn Benson, Susan Hohenberger