Sciweavers

988 search results - page 110 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
TFS
2008
127views more  TFS 2008»
14 years 9 months ago
An Intelligent System for Machinery Condition Monitoring
A reliable monitoring system is critically needed in a wide range of industries to detect the occurrence of a fault to prevent machinery performance degradation, malfunction, and s...
Wilson Wang
CORR
2010
Springer
175views Education» more  CORR 2010»
14 years 8 months ago
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing ...
K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chand...
HCI
2009
14 years 7 months ago
In-Situ 3D Indoor Modeler with a Camera and Self-contained Sensors
We propose a 3D modeler for supporting in-situ indoor modeling effectively. The modeler allows a user easily to create models from a single photo by interaction techniques taking a...
Tomoya Ishikawa, Kalaivani Thangamani, Masakatsu K...
CVPR
2011
IEEE
14 years 6 months ago
Object Segmentation by Alignment of Poselet Activations to Image Contours
In this paper, we propose techniques to make use of two complementary bottom-up features, image edges and texture patches, to guide top-down object segmentation towards higher pre...
Thomas Brox, Lubomir Bourdev, Subhransu Maji, Jite...
ACCV
2010
Springer
14 years 5 months ago
Optimizing Visual Vocabularies Using Soft Assignment Entropies
The state of the art for large database object retrieval in images is based on quantizing descriptors of interest points into visual words. High similarity between matching image r...
Yubin Kuang, Kalle Åström, Lars Kopp, M...