Sciweavers

2327 search results - page 425 / 466
» Secure Image Filtering
Sort
View
CGF
2002
187views more  CGF 2002»
14 years 11 months ago
Stylizing Silhouettes at Interactive Rates: From Silhouette Edges to Silhouette Strokes
A way to create effective stylized line drawings is to draw strokes that start and stop at visible portions along the silhouette of an object to be portrayed. In computer graphics...
Tobias Isenberg, Nick Halper, Thomas Strothotte
NN
2000
Springer
159views Neural Networks» more  NN 2000»
14 years 11 months ago
Independent component analysis for noisy data -- MEG data analysis
ICA (independent component analysis) is a new, simple and powerful idea for analyzing multi-variant data. One of the successful applications is neurobiological data analysis such ...
Shiro Ikeda, Keisuke Toyama
TNN
1998
96views more  TNN 1998»
14 years 11 months ago
Noise suppressing sensor encoding and neural signal orthonormalization
In this paper we regard first the situation where parallel channels are disturbed by noise. With the goal of maximal information conservation we deduce the conditions for a transf...
Rüdiger W. Brause, M. Rippl
TMI
2002
115views more  TMI 2002»
14 years 11 months ago
Discretization of the Radon transform and of its inverse by spline convolutions
Abstract--We present an explicit formula for B-spline convolution kernels; these are defined as the convolution of several B-splines of variable widths and degrees . We apply our r...
Stefan Horbelt, Michael Liebling, Michael Unser
TMM
2002
91views more  TMM 2002»
14 years 11 months ago
Power-spectrum condition for energy-efficient watermarking
This paper presents a model for watermarking and some attacks on watermarks. Given the watermarked signal, the so-called Wiener attack performs minimum mean-squared error (MMSE) es...
Jonathan K. Su, Bernd Girod