Sciweavers

5722 search results - page 950 / 1145
» Security Function Interactions
Sort
View
136
Voted
ECCV
2006
Springer
16 years 5 months ago
Robust Multi-body Motion Tracking Using Commute Time Clustering
Abstract. The presence of noise renders the classical factorization method almost impractical for real-world multi-body motion tracking problems. The main problem stems from the ef...
Huaijun Qiu, Edwin R. Hancock
148
Voted
ICIP
2006
IEEE
16 years 5 months ago
Design of a Transmission Protocol for a CVE
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...
243
Voted
ICDE
1996
IEEE
120views Database» more  ICDE 1996»
16 years 5 months ago
Towards the Reverse Engineering of Denormalized Relational Databases
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...
Jean-Marc Petit, Farouk Toumani, Jean-Franç...
141
Voted
ICPR
2006
IEEE
16 years 4 months ago
Detection of presynaptic terminals on dendritic spines in double labeling confocal images
For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a ...
Andreas Herzog, Bernd Michaelis, Gerald Krell, Kat...
118
Voted
ICPR
2004
IEEE
16 years 4 months ago
Surface Sculpting with Stochastic Deformable 3D Surfaces
This paper introduces a new stochastic surface model for deformable 3D surfaces and demonstrates its utility for the purpose of 3D sculpting. This is the problem of simple-touse a...
Andrew R. Willis, Jasper Speicher, David B. Cooper