Sciweavers

1509 search results - page 289 / 302
» Building Shape Models from Lousy Data
Sort
View
126
Voted
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 10 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
143
Voted
3DIM
2007
IEEE
15 years 10 months ago
Fast Omnidirectional 3D Scene Acquisition with an Array of Stereo Cameras
We present an omnidirectional 3D acquisition system based on a mobile array of high-resolution consumer digital SLR cameras that automatically capture high dynamic range stereo pa...
Jiajun Zhu, Greg Humphreys, David Koller, Skip Ste...
128
Voted
EEE
2005
IEEE
15 years 9 months ago
QoS Aggregation in Web Service Compositions
For the composition of Web services non-functional characteristics are commonly considered criteria for finding and selecting available services. Our work focuses on a mechanism ...
Michael C. Jaeger, Gregor Rojec-Goldmann, Gero M&u...
CVPR
1998
IEEE
16 years 5 months ago
Using Adaptive Tracking to Classify and Monitor Activities in a Site
We describe a vision system that monitors activity in a site over extended periods of time. The system uses a distributed set of sensors to cover the site, and an adaptive tracker...
W. Eric L. Grimson, Chris Stauffer, R. Romano, L. ...
152
Voted
ICIP
2004
IEEE
16 years 5 months ago
A motion field reconstruction scheme for smooth boundary video object segmentation
Motion segmentation is a classic and on-going research topic which is an important pre-stage for many video processes. The reliability of the motion field calculation directly dete...
Jean Gao, Ninad Thakoor, Sungyong Jung