Sciweavers

284 search results - page 31 / 57
» Detecting image spam using visual features and near duplicat...
Sort
View
IAAI
2003
14 years 11 months ago
Searching for Hidden Messages: Automatic Detection of Steganography
Steganography is the field of hiding messages in apparently innocuous media (e.g. images), and steganalysis is the field of detecting these covert messages. Almost all steganalysi...
George Berg, Ian Davidson, Ming-Yuan Duan, Goutam ...
TVCG
2011
100views more  TVCG 2011»
14 years 4 months ago
Tugging Graphs Faster: Efficiently Modifying Path-Preserving Hierarchies for Browsing Paths
—Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place t...
Daniel Archambault, Tamara Munzner, David Auber
APVIS
2009
14 years 11 months ago
TugGraph: Path-preserving hierarchies for browsing proximity and paths in graphs
Many graph visualization systems use graph hierarchies to organize a large input graph into logical components. These approaches detect features globally in the data and place the...
Daniel Archambault, Tamara Munzner, David Auber
VRML
2006
ACM
15 years 3 months ago
Using expressive rendering for remote visualization of large city models
In this paper, we present a new approach for remote visualization of large 3D cities. Our approach is based on expressive rendering (also known as Non-Photorealistic Rendering), a...
Jean-Charles Quillet, Gwenola Thomas, Xavier Grani...
RAS
2010
142views more  RAS 2010»
14 years 8 months ago
Closing the loop in appearance-guided omnidirectional visual odometry by using vocabulary trees
In this paper, we present a method that allows us to recover the trajectory of a vehicle purely from monocular omnidirectional images very accurately. The method uses a combination...
Davide Scaramuzza, Friedrich Fraundorfer, Marc Pol...