Sciweavers

799 search results - page 138 / 160
» Visualization of clone detection results
Sort
View
PCM
2005
Springer
288views Multimedia» more  PCM 2005»
14 years 1 months ago
Adaptive Deinterlacing for Real-Time Applications
In general, motion compensated (MC) deinterlacing algorithms can outperform non-MC (NMC) ones. However, we often prefer to choose the latter due to the considerations of error prop...
Qian Huang, Wen Gao, Debin Zhao, Huifang Sun
BIOADIT
2004
Springer
14 years 1 months ago
Explaining Low-Level Brightness-Contrast Illusions Using Disinhibition
Conventional Difference of Gaussian (DOG) filter is usually used to model the early stage of visual processing. However, convolution operation used with DOG does not explicitly a...
Yingwei Yu, Takashi Yamauchi, Yoonsuck Choe
ICMI
2004
Springer
152views Biometrics» more  ICMI 2004»
14 years 1 months ago
Exploiting prosodic structuring of coverbal gesticulation
Although gesture recognition has been studied extensively, communicative, affective, and biometrical “utility” of natural gesticulation remains relatively unexplored. One of t...
Sanshzar Kettebekov
SIBGRAPI
2003
IEEE
14 years 28 days ago
Secure Authentication Watermarking for Binary Images
Abstract. Authentication watermarking is a hidden data inserted into an image, in order to detect any alterations. It seems to be almost impossible to design a really secure authen...
Hae Yong Kim, Amir Afif
SI3D
2003
ACM
14 years 27 days ago
Incorporating dynamic real objects into immersive virtual environments
We present algorithms that enable virtual objects to interact with and respond to virtual representations, avatars, of real objects. These techniques allow dynamic real objects, s...
Benjamin Lok, Samir Naik, Mary C. Whitton, Frederi...