Sciweavers

381 search results - page 29 / 77
» Re-imagining the first year of computing
Sort
View
ACSE
2000
ACM
15 years 2 months ago
The information environments program - a new design based IT degree
The University of Queensland has recently established a new design-focused, studio-based IT degree at a new “flexible-learning” campus. The Bachelor of Information Environment...
Michael Docherty, Peter Sutton, Margot Brereton, S...
CVPR
1997
IEEE
15 years 1 months ago
A Stratified Approach to Metric Self-Calibration
Camera calibration is essential to many computer vision applications. In practice this often requires cumbersome calibration procedures to be carried out regularly. In the last fe...
Marc Pollefeys, Luc J. Van Gool
ICPR
2010
IEEE
14 years 12 months ago
Using Snakes with Asymmetric Energy Terms for the Detection of Varying-Contrast Edges in SAR Images
Active contour methods like snakes, have become a basic tool in computer vision and image analysis over the last years. They have proven to be adequate for the task of finding bou...
Benjamin Seppke, Leonie Dreschler-Fischer, Nathana...
ECCV
2008
Springer
14 years 11 months ago
Improving the Agility of Keyframe-Based SLAM
Abstract. The ability to localise a camera moving in a previously unknown environment is desirable for a wide range of applications. In computer vision this problem is studied as m...
Georg Klein, David W. Murray
ICISC
2008
126views Cryptology» more  ICISC 2008»
14 years 11 months ago
Essentially Optimal Universally Composable Oblivious Transfer
Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provid...
Ivan Damgård, Jesper Buus Nielsen, Claudio O...