Sciweavers

35 search results - page 5 / 7
» Removing Independently Even Crossings
Sort
View
ECCV
2006
Springer
14 years 7 months ago
Feature Harvesting for Tracking-by-Detection
We propose a fast approach to 3?D object detection and pose estimation that owes its robustness to a training phase during which the target object slowly moves with respect to the ...
Mustafa Özuysal, Vincent Lepetit, Franç...
TCC
2005
Springer
103views Cryptology» more  TCC 2005»
13 years 10 months ago
Fair-Zero Knowledge
Abstract. We introduce Fair Zero-Knowledge, a multi-verifier ZK system where every proof is guaranteed to be “zero-knowledge for all verifiers.” That is, if an honest verifi...
Matt Lepinski, Silvio Micali, Abhi Shelat
NSDI
2008
13 years 7 months ago
iPhish: Phishing Vulnerabilities on Consumer Electronics
As consumer electronic devices with embedded browsers become popular, financial institutions and online merchants set up websites to accommodate visitors using these devices. Thes...
Yuan Niu, Francis Hsu, Hao Chen
CGVR
2006
13 years 6 months ago
Image Reconstruction Scheme for Watersheds based Video Segmentation
- In this paper, we proposed a new solution to the reconstruction of image in order to solve the oversegmentation problem of watershed transformation which is widely used as an ima...
Hyun Sil Sin, Hyun Woo Park, Hwang Kyu Yang, Tae S...
ICDAR
2011
IEEE
12 years 4 months ago
Character Enhancement for Historical Newspapers Printed Using Hot Metal Typesetting
—We propose a new method for an effective removal of the printing artifacts occurring in historical newspapers which are caused by problems in the hot metal typesetting, a widely...
Iuliu Vasile Konya, Stefan Eickeler, Christoph Sei...