Sciweavers

1717 search results - page 291 / 344
» Error concealment using a diffusion based method
Sort
View
CVPR
2008
IEEE
15 years 12 months ago
Combining brain computer interfaces with vision for object categorization
Human-aided computing proposes using information measured directly from the human brain in order to perform useful tasks. In this paper, we extend this idea by fusing computer vis...
Ashish Kapoor, Pradeep Shenoy, Desney S. Tan
WEA
2005
Springer
109views Algorithms» more  WEA 2005»
15 years 3 months ago
Synchronization Fault Cryptanalysis for Breaking A5/1
Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, ...
Marcin Gomulkiewicz, Miroslaw Kutylowski, Heinrich...
IROS
2009
IEEE
189views Robotics» more  IROS 2009»
15 years 4 months ago
Moving object detection by multi-view geometric techniques from a single camera mounted robot
— The ability to detect, and track multiple moving objects like person and other robots, is an important prerequisite for mobile robots working in dynamic indoor environments. We...
Abhijit Kundu, Madhava M. Krishna, Jayanthi Sivasw...
IPPS
2008
IEEE
15 years 4 months ago
Improving software reliability and productivity via mining program source code
A software system interacts with third-party libraries through various APIs. Insufficient documentation and constant refactorings of third-party libraries make API library reuse ...
Tao Xie, Mithun Acharya, Suresh Thummalapenta, Kun...
IJCV
2000
195views more  IJCV 2000»
14 years 9 months ago
Optical Flow Constraints on Deformable Models with Applications to Face Tracking
Optical flow provides a constraint on the motion of a deformable model. We derive and solve a dynamic system incorporating flow as a hard constraint, producing a model-based least...
Douglas DeCarlo, Dimitris N. Metaxas