Sciweavers

43264 search results - page 246 / 8653
» Comparing models of computation
Sort
View
ICPR
2008
IEEE
15 years 10 months ago
Back to the future: Robust foreground extraction with reversed-time background modeling
“Ghosts” arise in traditional background subtraction when an object starts to move, causing the exposed background to be labelled as a ghost foreground. With background model ...
Akhilesh Kumar Sinha, Prithwijit Guha, Amitabha Mu...
ISCAS
2008
IEEE
119views Hardware» more  ISCAS 2008»
15 years 10 months ago
Adjusting the neurons models in neuromimetic ICs using the voltage-clamp technique
— This paper presents an original method to tune a neuromimetic IC based on neuron conductance-based models (Hodgkin-Huxley formalism). This method is well known in electrophysio...
Sylvain Saïghi, Laure Buhry, Yannick Bornat, ...
VISUALIZATION
2002
IEEE
15 years 8 months ago
Christmas Tree Case Study: Computed Tomography as a Tool for Mastering Complex Real World Objects with Applications in Computer
We report on using computed tomography (CT) as a model acquisition tool for complex objects in computer graphics. Unlike other modeling and scanning techniques the complexity of t...
Armin Kanitsar, Thomas Theußl, Lukas Mroz, M...
CVPR
2004
IEEE
15 years 7 months ago
Efficient Graphical Models for Processing Images
Graphical models are powerful tools for processing images. However, the large dimensionality of even local image data poses a difficulty: representing the range of possible graphi...
Marshall F. Tappen, Bryan C. Russell, William T. F...
WISEC
2009
ACM
15 years 10 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel