Results 221 to 230 of about 74,896 (309)
Some of the next articles are maybe not open access.
IEEE Transactions on Geoscience and Remote Sensing, 2018
Although the scale-invariant feature transform (SIFT) algorithm has been successfully applied to both optical image registration and synthetic aperture radar (SAR) image registration, SIFT-like algorithms have failed to register high-resolution (HR ...
Yuming Xiang, Feng Wang
exaly +2 more sources
Although the scale-invariant feature transform (SIFT) algorithm has been successfully applied to both optical image registration and synthetic aperture radar (SAR) image registration, SIFT-like algorithms have failed to register high-resolution (HR ...
Yuming Xiang, Feng Wang
exaly +2 more sources
SIFT missense predictions for genomes
Nature Protocols, 2015Robert Vaser +2 more
exaly +2 more sources
Proceedings of the 2008 conference of the center for advanced studies on collaborative research meeting of minds - CASCON '08, 2008
Comparing program execution traces can be useful for numerous purposes, such as software testing, system security analysis, program comprehension, software evolution and other areas of software development. Unfortunately, trace comparison techniques that operate on execution traces containing full execution details are too slow for use in large-scale ...
A. V. Miranskyy +6 more
openaire +1 more source
Comparing program execution traces can be useful for numerous purposes, such as software testing, system security analysis, program comprehension, software evolution and other areas of software development. Unfortunately, trace comparison techniques that operate on execution traces containing full execution details are too slow for use in large-scale ...
A. V. Miranskyy +6 more
openaire +1 more source
Combining Optimized SAR-SIFT Features and RD Model for Multisource SAR Image Registration
IEEE Transactions on Geoscience and Remote Sensing, 2021Multisource synthetic aperture radar (SAR) image registration is a difficult task in remote sensing due to the influence of speckle noise and geometric distortions between the images. The SAR scale-invariant feature transform (SAR-SIFT) is a prior option
Mengmeng Wang +3 more
semanticscholar +1 more source
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015
As the number of connected devices explodes, the use scenarios of these devices and data have multiplied. Many of these scenarios, e.g., home automation, require tools beyond data visualizations, to express user intents and to ensure interactions do not cause undesired effects in the physical world.
Chieh-Jan Mike Liang +7 more
openaire +1 more source
As the number of connected devices explodes, the use scenarios of these devices and data have multiplied. Many of these scenarios, e.g., home automation, require tools beyond data visualizations, to express user intents and to ensure interactions do not cause undesired effects in the physical world.
Chieh-Jan Mike Liang +7 more
openaire +1 more source
Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies, 2019
Sift is a new consensus protocol for replicating state machines. It disaggregates CPU and memory consumption by creating a novel system architecture enabled by one-sided RDMA operations. We show that this system architecture allows us to develop a consensus protocol which centralizes the replication logic.
Mikhail Kazhamiaka +6 more
openaire +1 more source
Sift is a new consensus protocol for replicating state machines. It disaggregates CPU and memory consumption by creating a novel system architecture enabled by one-sided RDMA operations. We show that this system architecture allows us to develop a consensus protocol which centralizes the replication logic.
Mikhail Kazhamiaka +6 more
openaire +1 more source
Proceedings of the 8th ACM International Conference on Computing Frontiers, 2011
Dynamic Information Flow Tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of vulnerabilities such as buffer overflow and code injection attacks. Software DIFT implementations incur very high performance overhead, while comprehensive hardware implementations add substantial complexity to the ...
Meltem Ozsoy +3 more
openaire +1 more source
Dynamic Information Flow Tracking (DIFT) is a powerful technique that can protect unmodified binaries from a broad range of vulnerabilities such as buffer overflow and code injection attacks. Software DIFT implementations incur very high performance overhead, while comprehensive hardware implementations add substantial complexity to the ...
Meltem Ozsoy +3 more
openaire +1 more source
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2017
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: matching a sparse set of scale invariant features, or dense matching using arbitrary scales.
Tal Hassner +3 more
openaire +2 more sources
Scale invariant feature detectors often find stable scales in only a few image pixels. Consequently, methods for feature matching typically choose one of two extreme options: matching a sparse set of scale invariant features, or dense matching using arbitrary scales.
Tal Hassner +3 more
openaire +2 more sources
IEEE Transactions on Dependable and Secure Computing, 2020
Multimedia data needs huge storage space, and application of multimedia data needs powerful capability of computing. Cloud computing can help owner of multimedia data to deal with it.
Linzhi Jiang +4 more
semanticscholar +1 more source
Multimedia data needs huge storage space, and application of multimedia data needs powerful capability of computing. Cloud computing can help owner of multimedia data to deal with it.
Linzhi Jiang +4 more
semanticscholar +1 more source
SIFT-aided path-independent digital image correlation accelerated by parallel computing
, 2020Current iterative digital image correlation (DIC) algorithms can efficiently converge at the deformation vector with high accuracy when they are fed with reliable initial guess.
Junrong Yang +7 more
semanticscholar +1 more source

