Sciweavers

5948 search results - page 333 / 1190
» Computing Robust Counter-Strategies
Sort
View
ACCV
2010
Springer
14 years 11 months ago
Estimating Meteorological Visibility Using Cameras: A Probabilistic Model-Driven Approach
Estimating the atmospheric or meteorological visibility distance is very important for air and ground transport safety, as well as for air quality. However, there is no holistic ap...
Nicolas Hautière, Raouf Babari, Eric Dumont...
CMA
2010
91views more  CMA 2010»
14 years 11 months ago
Numerical approximation of electromagnetic signals arising in the evaluation of geological formations
The integration of complicated oscillatory functions arises in computational electromagnetics when evaluating signals produced by the propagation of electromagnetic radiation thro...
Alexandre Caboussat, G. K. Miers
TOG
2012
237views Communications» more  TOG 2012»
13 years 7 months ago
An algebraic model for parameterized shape editing
We present an approach to high-level shape editing that adapts the structure of the shape while maintaining its global characteristics. Our main contribution is a new algebraic mo...
Martin Bokeloh, Michael Wand, Hans-Peter Seidel, V...
ECCV
2002
Springer
16 years 6 months ago
Regularized Shock Filters and Complex Diffusion
We address the issue of regularizing Osher and Rudin's shock filter, used for image deblurring, in order to allow processes that are more robust against noise. Previous soluti...
Guy Gilboa, Nir A. Sochen, Yehoshua Y. Zeevi
ICCSA
2007
Springer
15 years 11 months ago
Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods
In our recent study, we have presented an approach for tracing illegal users in content distribution networks using watermarking and fingerprinting techniques [1][2]. In this paper...
Hyun-Ho Kang, Brian M. Kurkoski, Kazuhiko Yamaguch...