Sciweavers

1433 search results - page 194 / 287
» imaging 2000
Sort
View
IJCNN
2000
IEEE
14 years 7 days ago
A Neural Network Approach for Visual Cryptography
In this paper, we propose a neural-network approach for visual authorization. It is an application on visual cryptography. The scheme contains a key-share and a set of user-shares....
Tai-Wen Yue, Suchen Chiang
CHI
2000
ACM
14 years 7 days ago
Using naming time to evaluate quality predictors for model simplification
Model simplification researchers require quality heuristics to guide simplification, and quality predictors to allow comparison of different simplification algorithms. However, th...
Benjamin Watson, Alinda Friedman, Aaron McGaffey
CVPR
2000
IEEE
14 years 10 months ago
Reconstruction from Six-Point Sequences
An algorithm is given for computing projective structure from a set of six points seen in a sequence of many images. The method is based on the notion of duality between cameras a...
Richard I. Hartley, Nicolas Y. Dano
MVA
2000
273views Computer Vision» more  MVA 2000»
13 years 7 months ago
A compact algorithm for rectification of stereo pairs
We present a linear rectification algorithm for general, unconstrained stereo rigs. The algorithm takes the two perspective projection matrices of the original cameras, and compute...
Andrea Fusiello, Emanuele Trucco, Alessandro Verri
JMIV
2002
172views more  JMIV 2002»
13 years 7 months ago
Grey-Scale Morphology Based on Fuzzy Logic
There exist several methods to extend binary morphology to grey-scale images. One of these methods is based on fuzzy logic and fuzzy set theory. Another approach starts from the c...
Ting-Quan Deng, Henk J. A. M. Heijmans