Sciweavers

1050 search results - page 91 / 210
» Two methods of authenticated positioning
Sort
View
117
Voted
ICSE
2009
IEEE-ACM
16 years 2 months ago
The impact of process choice in high maturity environments: An empirical analysis
We present the results of a three year field study of the software development process choices made by project teams at two leading offshore vendors. In particular, we focus on th...
Narayan Ramasubbu, Rajesh Krishna Balan
ICIAP
2003
ACM
16 years 2 months ago
Color correction for digital photographs
The paper describes a reliable and rapid method for detecting and removing a color cast (i.e. a superimposed dominant color) in a digital image without any a priori knowledge of i...
Francesca Gasparini, Raimondo Schettini
ACCV
2006
Springer
15 years 8 months ago
General Specular Surface Triangulation
We present a method for the reconstruction of a specular surface, using a single camera viewpoint and the reflection of a planar target placed at two different positions. Contrar...
Thomas Bonfort, Peter F. Sturm, Pau Gargallo
ICIP
2005
IEEE
15 years 7 months ago
Medical image registration based on random line sampling
One of the key aspects in 3D-image registration is the computation of the joint intensity histogram. We propose a new approach to compute this histogram using uniformly distribute...
Anton Bardera, Miquel Feixas, Imma Boada, Mateu Sb...
ACIVS
2005
Springer
15 years 7 months ago
Three Dimensional Fingertip Tracking in Stereovision
This paper presents a real time estimation method of the three dimensional trajectory of a fingertip. Pointing with the finger is indeed a natural gesture for Human Computer Inte...
Simon Conseil, Salah Bourennane, Lionel Martin