Sciweavers

2279 search results - page 62 / 456
» Robust Circle Detection
Sort
View
ENTCS
2010
99views more  ENTCS 2010»
14 years 12 months ago
State Based Robustness Testing for Components
Component based development allows to build software upon existing components and promises to improve software reuse and reduce costs. To gain reliability of a component based sys...
Bin Lei, Zhiming Liu, Charles Morisset, Xuandong L...
ICIP
2006
IEEE
16 years 1 months ago
Multiscale Keypoint Detection using the Dual-Tree Complex Wavelet Transform
We present a novel approach to detect multiscale keypoints using the Dual Tree Complex Wavelet Transform (DTCWT). We show that it is a well-suited basis for this problem as it is ...
Julien Fauqueur, Nick G. Kingsbury, Ryan Anderson
ICDE
2009
IEEE
134views Database» more  ICDE 2009»
16 years 1 months ago
Non-Exposure Location Anonymity
Location cloaking has been proposed and well studied to protect user privacy. It blurs the accurate user location (i.e., a point with coordinates) and replaces it with a well-shape...
Haibo Hu, Jianliang Xu
EDBT
2008
ACM
154views Database» more  EDBT 2008»
15 years 12 months ago
Ring-constrained join: deriving fair middleman locations from pointsets via a geometric constraint
We introduce a novel spatial join operator, the ring-constrained join (RCJ). Given two sets P and Q of spatial points, the result of RCJ consists of pairs p, q (where p P, q Q) ...
Man Lung Yiu, Panagiotis Karras, Nikos Mamoulis
SMA
2009
ACM
134views Solid Modeling» more  SMA 2009»
15 years 6 months ago
Exact Delaunay graph of smooth convex pseudo-circles: general predicates, and implementation for ellipses
We examine the problem of computing exactly the Delaunay graph (and the dual Voronoi diagram) of a set of, possibly intersecting, smooth convex pseudo-circles in the Euclidean pla...
Ioannis Z. Emiris, Elias P. Tsigaridas, George M. ...