Sciweavers

2327 search results - page 192 / 466
» Secure Image Filtering
Sort
View
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 7 months ago
Scheduling and energy-distortion tradeoffs with operational refinement of image processing
— Ubiquitous image processing tasks (such as transform decompositions, filtering and motion estimation) do not currently provide graceful degradation when their clock-cycles budg...
Davide Anastasia, Yiannis Andreopoulos
PERVASIVE
2006
Springer
15 years 1 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
ECCV
2008
Springer
16 years 3 months ago
Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search
This paper improves recent methods for large scale image search. State-of-the-art methods build on the bag-of-features image representation. We, first, analyze bag-of-features in t...
Herve Jegou, Matthijs Douze, Cordelia Schmid
120
Voted
ICIP
2006
IEEE
16 years 3 months ago
Gradient Adaptive Image Restoration and Enhancement
Various methods have been proposed for image enhancement and restoration. The main difficulty is how to enhance the structures uniformly while suppressing the noise without artifa...
Hongcheng Wang, Yunqiang Chen, Tong Fang, Jason Ty...
ICIP
2000
IEEE
16 years 3 months ago
A Novel Scheme for Image Rotation for Document Processing
Rotation of the binary image of a document page for correcting the skew in the case of OCR or signature verification systems entails disfigurement of the shape of the characters, ...
Kaushik Mahata, A. G. Ramakrishnan