Sciweavers

5269 search results - page 969 / 1054
» order 2007
Sort
View
ICCV
2007
IEEE
16 years 6 months ago
Real-Time Visibility-Based Fusion of Depth Maps
We present a viewpoint-based approach for the quick fusion of multiple stereo depth maps. Our method selects depth estimates for each pixel that minimize violations of visibility ...
Paul Merrell, Amir Akbarzadeh, Liang Wang, Philipp...
ICIP
2007
IEEE
16 years 6 months ago
A Statistical Approach for Intensity Loss Compensation of Confocal Microscopy Images
In this paper a probabilistic technique for compensation of intensity loss in the confocal microscopy images is presented. Confocal microscopy images are modeled as a mixture of t...
Sowmya Gopinath, Ninad Thakoor, Jean Gao, Kate Lub...
241
Voted
ICDE
2007
IEEE
151views Database» more  ICDE 2007»
16 years 5 months ago
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Networked information systems require strong security guarantees because of the new threats that they face. Various forms of encryption have been proposed to deal with this proble...
Tingjian Ge, Stanley B. Zdonik
ICDE
2007
IEEE
127views Database» more  ICDE 2007»
16 years 5 months ago
Supporting Streaming Updates in an Active Data Warehouse
Active Data Warehousing has emerged as an alternative to conventional warehousing practices in order to meet the high demand of applications for up-to-date information. In a nutsh...
Neoklis Polyzotis, Spiros Skiadopoulos, Panos Vass...
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 5 months ago
Fast Identification of Relational Constraint Violations
Logical constraints, (e.g., 'phone numbers in toronto can have prefixes 416, 647, 905 only'), are ubiquitous in relational databases. Traditional integrity constraints, ...
Amit Chandel, Nick Koudas, Ken Q. Pu, Divesh Sriva...