Sciweavers

2455 search results - page 391 / 491
» Computability of Models for Sequence Assembly
Sort
View
CCS
2007
ACM
15 years 10 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
IJCV
2008
201views more  IJCV 2008»
15 years 4 months ago
Probabilistic Fusion of Stereo with Color and Contrast for Bi-Layer Segmentation
This paper describes two algorithms for the real-time segmentation of foreground from background layers in stereo video sequences. Automatic separation of layers from colour/contr...
Vladimir Kolmogorov, Antonio Criminisi, Andrew Bla...
TCSV
2008
291views more  TCSV 2008»
15 years 4 months ago
A Statistical Video Content Recognition Method Using Invariant Features on Object Trajectories
Abstract--This work is dedicated to a statistical trajectorybased approach addressing two issues related to dynamic video content understanding: recognition of events and detection...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...
ICIP
1999
IEEE
16 years 6 months ago
Video Motion Capture Using Feature Tracking and Skeleton Reconstruction
In the domain of computer vision, there exists a very wide application for the research of human motion capture. This paper proposes a new approach to do motion capture in video. ...
Xiaoming Liu 0002, Yueting Zhuang, Yunhe Pan
3DPVT
2004
IEEE
101views Visualization» more  3DPVT 2004»
15 years 8 months ago
Pyramid Coordinates for Morphing and Deformation
Many model editing operations, such as morphing, blending, and shape deformation, require the ability to interactively transform the surface of a model in response to some control...
Alla Sheffer, Vladislav Kraevoy