Sciweavers

4529 search results - page 820 / 906
» Position Based Cryptography
Sort
View
VR
2011
IEEE
309views Virtual Reality» more  VR 2011»
14 years 4 months ago
Two-handed tangible interaction techniques for composing augmented blocks
Abstract Modeling tools typically have their own interaction methods for combining virtual objects. For realistic composition in 3D space, many researchers from the fields of virt...
Hyeongmook Lee, Mark Billinghurst, Woontack Woo
SIGPRO
2011
275views Hardware» more  SIGPRO 2011»
14 years 3 months ago
Synthesis of multivariate stationary series with prescribed marginal distributions and covariance using circulant matrix embeddi
The problem of synthesizing multivariate stationary series Y [n] = (Y1[n], . . . , YP [n])T , n ∈ Z, with prescribed non-Gaussian marginal distributions, and a targeted covarian...
Hannes Helgason, Vladas Pipiras, Patrice Abry

Publication
314views
14 years 9 months ago
On the use of discrete Pascal transform in hiding data in images
The Discrete Pascal Transform (DPT) has been proved remarkably useful for edge detection, filter design, discrete-time signal interpolation and data hiding. In the present work a n...
E. E. Varsaki, V. Fotopoulos and A. N. Skodras
EMMCVPR
2011
Springer
14 years 20 days ago
Curvature Regularization for Curves and Surfaces in a Global Optimization Framework
Length and area regularization are commonplace for inverse problems today. It has however turned out to be much more difficult to incorporate a curvature prior. In this paper we pr...
Petter Strandmark, Fredrik Kahl
ICDAR
2011
IEEE
14 years 16 days ago
Language-Independent Text Lines Extraction Using Seam Carving
Abstract—In this paper, we present a novel languageindependent algorithm for extracting text-lines from handwritten document images. Our algorithm is based on the seam carving ap...
Raid Saabni, Jihad El-Sana