Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
This paper describes a graph-spectral method for 3D surface integration. The algorithm takes as its input a 2D field of surface normal estimates, delivered, for instance, by a sh...
In this paper we describe a new shape-from-shading method. We show how the parallel transport of surface normals can be used to impose curvature consistency and also to iterativel...
Image registrations have been a subject of extensive study over the last decade. They appear in numerous applications including Computer Vision, Pattern Recognition, Medical Image...
Identification and characterization of indications in eddy current (ET) signals can be highly subjective in nature, with varying diagnoses made by different analysts or by a singl...
Arthur J. Levy, Jane E. Oppenlander, David M. Brud...