Sciweavers

144 search results - page 23 / 29
» Use of power law models in detecting region of interest
Sort
View
CVPR
2009
IEEE
15 years 2 months ago
Active Volume Models for 3D Medical Image Segmentation
In this paper, we propose a novel predictive model for object boundary, which can integrate information from any sources. The model is a dynamic “object” model whose manifes...
Tian Shen (Lehigh University), Hongsheng Li (Lehig...
FCCM
1998
IEEE
169views VLSI» more  FCCM 1998»
13 years 12 months ago
Scalable Network Based FPGA Accelerators for an Automatic Target Recognition Application
Abstract Image processing, specifically Automatic Target Recognition (ATR) in Synthetic Aperture Radar (SAR) imagery, is an application area that can require tremendous processing ...
Ruth Sivilotti, Young Cho, Wen-King Su, Danny Cohe...
CVPR
2006
IEEE
14 years 9 months ago
Reciprocal Image Features for Uncalibrated Helmholtz Stereopsis
Helmholtz stereopsis is a surface reconstruction method that exploits reciprocity for the recovery of 3D shape without an assumed BRDF model, and it has been shown to yield high q...
Todd Zickler
TMC
2010
155views more  TMC 2010»
13 years 6 months ago
Maximizing the Lifetime of a Barrier of Wireless Sensors
—To make a network last beyond the lifetime of an individual sensor, redundant sensors must be deployed. What sleep-wakeup schedule can then be used for individual sensors so tha...
Santosh Kumar, Ten-Hwang Lai, Marc E. Posner, Pras...
CORR
2010
Springer
225views Education» more  CORR 2010»
13 years 7 months ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...