Sciweavers

1717 search results - page 291 / 344
» Error concealment using a diffusion based method
Sort
View
139
Voted
CVPR
2008
IEEE
16 years 4 months ago
Combining brain computer interfaces with vision for object categorization
Human-aided computing proposes using information measured directly from the human brain in order to perform useful tasks. In this paper, we extend this idea by fusing computer vis...
Ashish Kapoor, Pradeep Shenoy, Desney S. Tan
120
Voted
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 8 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
146
Voted
IROS
2009
IEEE
189views Robotics» more  IROS 2009»
15 years 9 months ago
Moving object detection by multi-view geometric techniques from a single camera mounted robot
— The ability to detect, and track multiple moving objects like person and other robots, is an important prerequisite for mobile robots working in dynamic indoor environments. We...
Abhijit Kundu, Madhava M. Krishna, Jayanthi Sivasw...
164
Voted
IPPS
2008
IEEE
15 years 9 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
126
Voted
IJCV
2000
195views more  IJCV 2000»
15 years 2 months ago
Optical Flow Constraints on Deformable Models with Applications to Face Tracking
Optical flow provides a constraint on the motion of a deformable model. We derive and solve a dynamic system incorporating flow as a hard constraint, producing a model-based least...
Douglas DeCarlo, Dimitris N. Metaxas