Sciweavers

491 search results - page 63 / 99
» Random Paintbrush Transformation
Sort
View
119
Voted
ICIAR
2009
Springer
15 years 7 months ago
Detection of Linear Structures in Remote-Sensed Images
Over the past decades, considerable progress had been made in developing automatic image interpretation tools for remote sensing. There is, however, still a gap between the require...
Rui Gao, Walter F. Bischof
119
Voted
FOCS
2008
IEEE
15 years 6 months ago
Constant-Time Approximation Algorithms via Local Improvements
We present a technique for transforming classical approximation algorithms into constant-time algorithms that approximate the size of the optimal solution. Our technique is applic...
Huy N. Nguyen, Krzysztof Onak
112
Voted
ICPR
2008
IEEE
15 years 6 months ago
Fingerprint orientation analysis with topological modeling
This paper proposes to characterize the fingerprint orientation using a novel topological representation, which transforms the orientation field into a map composed of a set of ...
Zujun Hou, Jun Li, Hwee Keong Lam, Tai Pang Chen, ...
ACNS
2007
Springer
136views Cryptology» more  ACNS 2007»
15 years 6 months ago
Identity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have ...
Matthew Green, Giuseppe Ateniese
IROS
2006
IEEE
152views Robotics» more  IROS 2006»
15 years 6 months ago
Experiments with robust estimation techniques in real-time robot vision
— The goal of this paper is to present an overview of robust estimation techniques with a special focus on robotic vision applications. In this particular context, constraints du...
Ezio Malis, Éric Marchand