Sciweavers

1092 search results - page 92 / 219
» aime 2009
Sort
View
TCC
2009
Springer
132views Cryptology» more  TCC 2009»
15 years 10 months ago
Authenticated Adversarial Routing
: The aim of this paper is to demonstrate the feasibility of authenticated throughput-ecient routing in an unreliable and dynamically changing synchronous network in which the majo...
Yair Amir, Paul Bunn, Rafail Ostrovsky
ICASSP
2009
IEEE
15 years 4 months ago
Convex analysis based minimum-volume enclosing simplex algorithm for hyperspectral unmixing
Abstract—Hyperspectral unmixing aims at identifying the hidden spectral signatures (or endmembers) and their corresponding proportions (or abundances) from an observed hyperspect...
Tsung-Han Chan, Chong-Yung Chi, Yu-Min Huang, Wing...
103
Voted
CVPR
2009
IEEE
16 years 5 months ago
Stereo Matching in the Presence of Sub-Pixel Calibration Errors
Stereo matching commonly requires rectified images that are computed from calibrated cameras. Since all under- lying parametric camera models are only approximations, calibratio...
Heiko Hirschmüller, Stefan K. Gehrig
CVPR
2009
IEEE
16 years 5 months ago
Learning Shape Prior Models for Object Matching
The aim of this work is to learn a shape prior model for an object class and to improve shape matching with the learned shape prior. Given images of example instances, we can le...
Cordelia Schmid, Frédéric Jurie, Tin...
ICCV
2009
IEEE
16 years 3 months ago
3D reconstruction from image collections with a single known focal length
In this paper we aim at reconstructing 3D scenes from images with unknown focal lengths downloaded from photosharing websites such as Flickr. First we provide a minimal solution...
Martin Bujnak, Zuzana Kukelova, Tomas Pajdla