Sciweavers

1050 search results - page 101 / 210
» Two methods of authenticated positioning
Sort
View
ITICSE
2005
ACM
15 years 8 months ago
Teaching programming and language concepts using LEGOs
concepts more concrete. The method has two main learning outcomes: • Language Specification – The goal of the assignment is to be able to build LEGO® creations on a standard g...
Cynthia S. Hood, Dennis J. Hood
CORR
2010
Springer
111views Education» more  CORR 2010»
15 years 14 days ago
Calibration for Ultrasound Breast Tomography Using Matrix Completion
We study the calibration problem in circular ultrasound tomography devices for breast imaging, where the sensor positions deviate from the circumference of a perfect circle. We in...
Reza Parhizkar, Amin Karbasi, Sewoong Oh, Martin V...
RECOMB
2007
Springer
16 years 3 months ago
An Efficient and Accurate Graph-Based Approach to Detect Population Substructure
Currently, large-scale projects are underway to perform whole genome disease association studies. Such studies involve the genotyping of hundreds of thousands of SNP markers. One o...
Srinath Sridhar, Satish Rao, Eran Halperin
CVPR
2008
IEEE
16 years 5 months ago
What can missing correspondences tell us about 3D structure and motion?
Practically all existing approaches to structure and motion computation use only positive image correspondences to verify the camera pose hypotheses. Incorrect epipolar geometries...
Christopher Zach, Arnold Irschara, Horst Bischof
ECCV
2008
Springer
16 years 5 months ago
Extracting Moving People from Internet Videos
Abstract. We propose a fully automatic framework to detect and extract arbitrary human motion volumes from real-world videos collected from YouTube. Our system is composed of two s...
Juan Carlos Niebles, Bohyung Han, Andras Ferencz, ...