Sciweavers

6583 search results - page 1116 / 1317
» Semantic Analysis Patterns
Sort
View
122
Voted
MM
2003
ACM
116views Multimedia» more  MM 2003»
15 years 9 months ago
Photo2Video
To exploit rich content embedded in a single photograph, a system named Photo2Video was developed to automatically convert a photographic series into a video by simulating camera ...
Xian-Sheng Hua, Lie Lu, HongJiang Zhang
SIGGRAPH
2003
ACM
15 years 9 months ago
Cloth motion capture
Recent years have seen an increased interest in motion capture systems. Current systems, however, are limited to only a few degrees of freedom, so that effectively only the motion...
David Pritchard, Wolfgang Heidrich
WPES
2003
ACM
15 years 9 months ago
Covert channels and anonymizing networks
There have long been threads of investigation into covert channels, and threads of investigation into anonymity, but these two closely related areas of information hiding have not...
Ira S. Moskowitz, Richard E. Newman, Daniel P. Cre...
142
Voted
CAIP
2003
Springer
236views Image Analysis» more  CAIP 2003»
15 years 9 months ago
Efficient Algorithm of Eye Image Check for Robust Iris Recognition System
For the improvement of iris recognition system performance, the filtering algorithm that picks out counterfeit and noisy data is very important. In this paper, as a part of preproc...
Jain Jang, Kwiju Kim, Yillbyung Lee
115
Voted
IBPRIA
2003
Springer
15 years 9 months ago
Regularization of 3D Cylindrical Surfaces
In this paper we present a method for the regularization of 3D cylindrical surfaces. By a cylindrical surface we mean a 3D surface that can be expressed as an application S(l, θ) ...
Luis Álvarez, Carmelo Cuenca, Javier S&aacu...
« Prev « First page 1116 / 1317 Last » Next »