Sciweavers

9888 search results - page 1972 / 1978
» compute 2009
Sort
View
105
Voted
ICISC
2009
132views Cryptology» more  ICISC 2009»
14 years 10 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ICRA
2009
IEEE
226views Robotics» more  ICRA 2009»
14 years 10 months ago
3D model selection from an internet database for robotic vision
Abstract-- We propose a new method for automatically accessing an internet database of 3D models that are searchable only by their user-annotated labels, for using them for vision ...
Ulrich Klank, Muhammad Zeeshan Zia, Michael Beetz
ICRA
2009
IEEE
218views Robotics» more  ICRA 2009»
14 years 10 months ago
Automatically and efficiently inferring the hierarchical structure of visual maps
In Simultaneous Localisation and Mapping (SLAM), it is well known that probabilistic filtering approaches which aim to estimate the robot and map state sequentially suffer from poo...
Margarita Chli, Andrew J. Davison
142
Voted
ICTAI
2009
IEEE
14 years 10 months ago
A Generalized Cyclic-Clustering Approach for Solving Structured CSPs
We propose a new method for solving structured CSPs which generalizes and improves the Cyclic-Clustering approach [4]. First, the cutset and the tree-decomposition of the constrai...
Cédric Pinto, Cyril Terrioux
IGARSS
2009
14 years 10 months ago
Affine Compensation of Illumination in Hyperspectral Remote Sensing Images
A problem when working with optical satellite or airborne images is the need to compensate for changes in the illumination conditions at the time of acquisition. This is particula...
Pedro Latorre Carmona, Jose Moreno, Filiberto Pla,...
« Prev « First page 1972 / 1978 Last » Next »