Results 1 - 10
of
4,061
Snakes, Shapes, and Gradient Vector Flow
- IEEE TRANSACTIONS ON IMAGE PROCESSING
, 1998
"... Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to boundary concavities, however, have limited their utility. This paper presents a new extern ..."
Abstract
-
Cited by 755 (16 self)
- Add to MetaCart
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to boundary concavities, however, have limited their utility. This paper presents a new
FAST VOLUME RENDERING USING A SHEAR-WARP FACTORIZATION OF THE VIEWING TRANSFORMATION
, 1995
"... Volume rendering is a technique for visualizing 3D arrays of sampled data. It has applications in areas such as medical imaging and scientific visualization, but its use has been limited by its high computational expense. Early implementations of volume rendering used brute-force techniques that req ..."
Abstract
-
Cited by 542 (2 self)
- Add to MetaCart
Volume rendering is a technique for visualizing 3D arrays of sampled data. It has applications in areas such as medical imaging and scientific visualization, but its use has been limited by its high computational expense. Early implementations of volume rendering used brute-force techniques
Observation of a single-beam gradient force optical trap for dielectric particles
- Opt.Lett
, 1986
"... Optical trapping of dielectric particles by a single-beam gradient force trap was demonstrated for the first reported time. This confirms the concept of negative light pressure due to the gradient force. Trapping was observed over the entire range of particle size from 10 um to-25 nm in water. Use o ..."
Abstract
-
Cited by 253 (0 self)
- Add to MetaCart
Optical trapping of dielectric particles by a single-beam gradient force trap was demonstrated for the first reported time. This confirms the concept of negative light pressure due to the gradient force. Trapping was observed over the entire range of particle size from 10 um to-25 nm in water. Use
The stages of economic growth.
- Economic History Review , 2nd series 12,
, 1959
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract
-
Cited by 297 (0 self)
- Add to MetaCart
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about
Gradient vector flow: A new external force for snakes
- In Proceedings of the Conference on Computer Vision and Pattern Recognition
, 1997
"... Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to concave boundaries, howevel; have limited their utility. This paper develops a new external ..."
Abstract
-
Cited by 201 (5 self)
- Add to MetaCart
external force for active contours, largely solving both problems. This external force, which we call gradient vector flow (GVF), is computed as a dijhsion of the gradient vectors of a gray-level or binary edge map derived from the image. The resultant field has a large capture range and forces active
Surface Modeling with Oriented Particle Systems
- COMPUTER GRAPHICS
, 1991
"... Splines and deformable surface models are widely used in computer graphics to describe free-form surfaces. These methods require manual preprocessing to discretize the surface into patches and to specify their connectivity. We present a new model of elastic surfaces based on interacting particle sys ..."
Abstract
-
Cited by 216 (6 self)
- Add to MetaCart
systems, which, unlike previous techniques, can be used to split, join, or extend surfaces without the need for manual intervention. The particles we use have long-range attraction forces and short-range repulsion forces and follow Newtonian dynamics, much like recent computational models of fluids
Transparent Run-Time Defense Against Stack Smashing Attacks
- In Proceedings of the USENIX Annual Technical Conference
, 2000
"... The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing pre-compiled executable and can be used tran ..."
Abstract
-
Cited by 204 (3 self)
- Add to MetaCart
The exploitation of buffer overflow vulnerabilities in process stacks constitutes a significant portion of security attacks. We present two new methods to detect and handle such attacks. In contrast to previous work, the new methods work with any existing pre-compiled executable and can be used
Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc Networks
- Mobile Networks and Applications
, 1998
"... We evaluate several routing protocols for mobile, wireless, ad hoc networks via packet level simulations. The protocol suite includes routing protocols specifically designed for ad hoc routing, as well as more traditional protocols, such as link state and distance vector, used for dynamic networks. ..."
Abstract
-
Cited by 203 (8 self)
- Add to MetaCart
. Performance is evaluated with respect to fraction of packets delivered, end-to-end delay and routing load for a given traffic and mobility model. It is observed that the new generation of on-demand routing protocols use much lower routing load. However, the traditional link state and distance vector protocols
Signs of Intermediate Range Hadronic Forces
, 1997
"... We consider high energy hadron-hadron scattering. We show the presence in the amplitude of terms of the form is(q 2 =m 4 ) ln(\Gammaq 2 =m 2 ) for transferred momentum squared m 2 hadr ?? \Gammaq 2 2 QCD and p s AE m. We relate such terms to a novel interaction at impact distances ..."
Abstract
- Add to MetaCart
. The relation with the structure of the diffractive cone at very small transferred momentum and some possible ways to detect these intermediate range effects are briefly discussed. Introduction It is well known since long time that, for the description of the high energy peripheral scattering and differently
Generalized Gradient Vector Flow External Forces for Active Contours
- Signal Processing
, 1998
"... Active contours, or snakes, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. A new type of external force for active contours, called gradient vector flow (GVF) was introduced recently to address problems associated with initializat ..."
Abstract
-
Cited by 148 (6 self)
- Add to MetaCart
Active contours, or snakes, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. A new type of external force for active contours, called gradient vector flow (GVF) was introduced recently to address problems associated
Results 1 - 10
of
4,061