Sciweavers

2327 search results - page 192 / 466
» Secure Image Filtering
Sort
View
98
Voted
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
15 years 4 months ago
Scheduling and energy-distortion tradeoffs with operational refinement of image processing
— Ubiquitous image processing tasks (such as transform decompositions, filtering and motion estimation) do not currently provide graceful degradation when their clock-cycles budg...
Davide Anastasia, Yiannis Andreopoulos
73
Voted
PERVASIVE
2006
Springer
14 years 11 months ago
Secure Mobile Computing Via Public Terminals
The rich interaction capabilities of public terminals can make them more convenient to use than small personal devices, such as smart phones. However, the use of public terminals t...
Richard Sharp, James Scott, Alastair R. Beresford
95
Voted
ECCV
2008
Springer
16 years 24 days ago
Hamming Embedding and Weak Geometric Consistency for Large Scale Image Search
This paper improves recent methods for large scale image search. State-of-the-art methods build on the bag-of-features image representation. We, first, analyze bag-of-features in t...
Herve Jegou, Matthijs Douze, Cordelia Schmid
ICIP
2006
IEEE
16 years 17 days ago
Gradient Adaptive Image Restoration and Enhancement
Various methods have been proposed for image enhancement and restoration. The main difficulty is how to enhance the structures uniformly while suppressing the noise without artifa...
Hongcheng Wang, Yunqiang Chen, Tong Fang, Jason Ty...
ICIP
2000
IEEE
16 years 15 days ago
A Novel Scheme for Image Rotation for Document Processing
Rotation of the binary image of a document page for correcting the skew in the case of OCR or signature verification systems entails disfigurement of the shape of the characters, ...
Kaushik Mahata, A. G. Ramakrishnan