Sciweavers

1050 search results - page 44 / 210
» Two methods of authenticated positioning
Sort
View
ACCV
2006
Springer
15 years 5 months ago
Heuristic Pre-clustering Relevance Feedback in Region-Based Image Retrieval
Relevance feedback (RF) and region-based image retrieval (RBIR) are two widely used methods to enhance the performance of contentbased image retrieval (CBIR) systems. In this paper...
Wan-Ting Su, Wen-Sheng Chu, James Jenn-Jier Lien
TVCG
1998
133views more  TVCG 1998»
14 years 11 months ago
Novel View Synthesis by Cascading Trilinear Tensors
—We present a new method for synthesizing novel views of a 3D scene from two or three reference images in full correspondence. The core of this work is the use and manipulation o...
Shai Avidan, Amnon Shashua
ICRA
2002
IEEE
90views Robotics» more  ICRA 2002»
15 years 4 months ago
An Analytical Grasp Planning on Given Object with Multifingered Hand
In this paper, an analytical approach is proposed for planning finger positions of an object with multifingered hand. At first, a method is given to obtain which combination of th...
Ying Li, Yong Yu, Showzow Tsujio
CGF
2005
133views more  CGF 2005»
14 years 11 months ago
Constrained Visualization Using the Shepard Interpolation Family
This paper discusses the problem of visualizing data where there are underlying constraints that must be preserved. For example, we may know that the data are inherently positive....
Ken W. Brodlie, Muhammed Rafiq Asim, Keith Unswort...
FPT
2005
IEEE
98views Hardware» more  FPT 2005»
15 years 5 months ago
Secure Partial Reconfiguration of FPGAs
SRAM FPGAs are vulnerable to security breaches such as bitstream cloning, reverse-engineering, and tampering. Bitstream encryption and authentication are two most effective and pr...
Amir Sheikh Zeineddini, Kris Gaj