Sciweavers

3319 search results - page 346 / 664
» Type Theoretical Databases
Sort
View
139
Voted
CVPR
2000
IEEE
15 years 8 months ago
Error Analysis of Background Adaption
Background modeling is a common component in video surveillance systems and is used to quickly identify regions of interest. To increase the robustness of background subtraction t...
Xiang Gao, Terrance E. Boult, Frans Coetzee, Visva...
123
Voted
ITC
2000
IEEE
91views Hardware» more  ITC 2000»
15 years 8 months ago
A mixed mode BIST scheme based on reseeding of folding counters
In this paper a new scheme for deterministic and mixed mode scan-based BIST is presented. It relies on a new type of test pattern generator which resembles a programmable Johnson ...
Sybille Hellebrand, Hans-Joachim Wunderlich, Huagu...
137
Voted
SIBGRAPI
1999
IEEE
15 years 8 months ago
Developing Morphological Building Blocks: From Design to Implementation
Abstract. Mathematical morphology has become a widely used technique for image processing and computer vision. Initially designed as a set theory, it was generalized to the set of ...
Marcos Cordeiro d'Ornellas, Rein van den Boomgaard
140
Voted
ICVS
1999
Springer
15 years 8 months ago
ADORE: Adaptive Object Recognition
Many modern computer vision systems are built by chaining together standard vision procedures, often in graphical programming environments such as Khoros, CVIPtools or IUE. Typical...
Bruce A. Draper, José Bins, Kyungim Baek
149
Voted
FC
1998
Springer
164views Cryptology» more  FC 1998»
15 years 7 months ago
Robustness and Security of Digital Watermarks
Digital watermarking is a nascent but promising technology that offers protection of unencrypted digital content. This paper is a brief technical survey of the multimedia watermark...
Lesley R. Matheson, Stephen G. Mitchell, Talal Sha...