Sciweavers

1050 search results - page 130 / 210
» Two methods of authenticated positioning
Sort
View
HCI
2009
14 years 11 months ago
Acquiring a Physical World and Serving Its Mirror World Simultaneously
A mirror world, which is a virtual space modeling a physical space, attracts enormous interests from VR community recently. Various applications such as Second Life, Google Earth a...
Sengpyo Hong, Jong-gil Ahn, Heedong Ko, Jinwook Ki...
136
Voted
CVPR
2012
IEEE
13 years 4 months ago
Leveraging stereopsis for saliency analysis
Stereopsis provides an additional depth cue and plays an important role in the human vision system. This paper explores stereopsis for saliency analysis and presents two approache...
Yuzhen Niu, Yujie Geng, Xueqing Li, Feng Liu
94
Voted
ICIP
2006
IEEE
16 years 3 months ago
New Results on Efficient Optimal Multilevel Image Thresholding
Image thresholding is one of the most common image processing operations, since almost all image processing schemes need some sort of separation of the pixels into different class...
Martin Luessi, Marco Eichmann, Guido M. Schuster, ...
99
Voted
ICPR
2006
IEEE
16 years 3 months ago
Fingerprint Matching Using Minutia Polygons
Fingerprint distortion changes both the geometric position and orientation of minutiae, and leads to difficulties in establishing a match among multiple impressions acquired from ...
Tetsuo Asano, Xuefeng Liang
EDBT
2008
ACM
166views Database» more  EDBT 2008»
16 years 2 months ago
A novel spectral coding in a large graph database
Retrieving related graphs containing a query graph from a large graph database is a key issue in many graph-based applications, such as drug discovery and structural pattern recog...
Lei Zou, Lei Chen 0002, Jeffrey Xu Yu, Yansheng Lu