Sciweavers

1509 search results - page 289 / 302
» Building Shape Models from Lousy Data
Sort
View
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 4 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
3DIM
2007
IEEE
15 years 4 months ago
Fast Omnidirectional 3D Scene Acquisition with an Array of Stereo Cameras
We present an omnidirectional 3D acquisition system based on a mobile array of high-resolution consumer digital SLR cameras that automatically capture high dynamic range stereo pa...
Jiajun Zhu, Greg Humphreys, David Koller, Skip Ste...
83
Voted
EEE
2005
IEEE
15 years 3 months ago
QoS Aggregation in Web Service Compositions
For the composition of Web services non-functional characteristics are commonly considered criteria for finding and selecting available services. Our work focuses on a mechanism ...
Michael C. Jaeger, Gregor Rojec-Goldmann, Gero M&u...
CVPR
1998
IEEE
15 years 11 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
ICIP
2004
IEEE
15 years 11 months ago
A motion field reconstruction scheme for smooth boundary video object segmentation
Motion segmentation is a classic and on-going research topic which is an important pre-stage for many video processes. The reliability of the motion field calculation directly dete...
Jean Gao, Ninad Thakoor, Sungyong Jung