Sciweavers

1050 search results - page 59 / 210
» Two methods of authenticated positioning
Sort
View
ACCV
2010
Springer
14 years 6 months ago
Planar Affine Rectification from Change of Scale
A method for affine rectification of a plane exploiting knowledge of relative scale changes is presented. The rectifying transformation is fully specified by the relative scale cha...
Ondrej Chum, Jiri Matas
JUCS
2008
166views more  JUCS 2008»
14 years 11 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
MVA
1990
114views Computer Vision» more  MVA 1990»
15 years 1 months ago
Radar Image Processing for Locating Underground Linear Objects
This paper presents an image processing method for locating underground linear objects using ground-probing radar data. One of the problems when using groundprobing radars is how ...
Toru Kaneko
ICSM
2005
IEEE
15 years 5 months ago
Co-Change Visualization
Clustering layouts of software systems combine two important aspects: they reveal groups of related artifacts of the software system, and they produce a visualization of the resul...
Dirk Beyer
AIPR
2003
IEEE
15 years 5 months ago
Registration of Range Data from Unmanned Aerial and Ground Vehicles
In the research reported in this paper, we propose to overcome the unavailability of Global Positioning System (GPS) using combined information obtained from a scanning LADAR rang...
Anthony Downs, Raj Madhavan, Tsai Hong