Sciweavers

1050 search results - page 186 / 210
» Two methods of authenticated positioning
Sort
View
CVPR
1999
IEEE
16 years 1 months ago
Using the Condensation Algorithm for Robust, Vision-based Mobile Robot Localization
To navigate reliably in indoor environments, a mobile robot must know where it is. This includes both the ability of globally localizing the robot from scratch, as well as trackin...
Frank Dellaert, Wolfram Burgard, Dieter Fox, Sebas...
ICCV
2005
IEEE
16 years 1 months ago
Building a Classification Cascade for Visual Identification from One Example
Object identification (OID) is specialized recognition where the category is known (e.g. cars) and the algorithm recognizes an object's exact identity (e.g. Bob's BMW). ...
Andras Ferencz, Erik G. Learned-Miller, Jitendra M...
90
Voted
ECCV
1992
Springer
16 years 1 months ago
Determining Three-Dimensional Shape from Orientation and Spatial Frequency Disparities
Abstract. Binocular di erences in orientation and foreshortening are systematically related to surface slant and tilt and could potentially be exploited by biological and machine v...
David G. Jones, Jitendra Malik
BIBM
2009
IEEE
155views Bioinformatics» more  BIBM 2009»
15 years 6 months ago
Towards Reliable Isoform Quantification Using RNA-Seq Data
Background: In eukaryotes, alternative splicing often generates multiple splice variants from a single gene. Here weexplore the use of RNA sequencing (RNA-Seq) datasets to address...
Brian E. Howard, Steffen Heber
SIGGRAPH
1994
ACM
15 years 3 months ago
Zippered polygon meshes from range images
Range imaging offers an inexpensive and accurate means for digitizing the shape of three-dimensional objects. Because most objects self occlude, no single range image suffices to ...
Greg Turk, Marc Levoy