Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
Historically, mathematical morphology has primarily focused on the processing and analysis of two-dimensional image data. In this paper, we survey a number of other areas where mathematical morphology finds fruitful a...
详细信息
ISBN:
(纸本)9783642215698
Historically, mathematical morphology has primarily focused on the processing and analysis of two-dimensional image data. In this paper, we survey a number of other areas where mathematical morphology finds fruitful application, such as computergraphics and solid modeling;path planning;filtering, segmentation and visualization of volume data;or visual exploration of high-dimensional data. We also mention techniques for accelerating morphological computations by using graphics hardware (GPU computing).
In recent years, GPUs (graphicsprocessing Units) have shown a significant advance of computational resources available for the use of non-graphical applications. The ability to solve problems involving parallel compu...
详细信息
This paper presents a model to reconstruct 3D virtual humans based on a single and spontaneous image. The main goal is to use computer vision and pattern recognition techniques to build coherent virtual humans accordi...
详细信息
This paper describes the principles, implementation, and results of a weeklong summer science course for junior high and high school students interested in computer science. To motivate and foster interest and creativ...
详细信息
ISBN:
(纸本)9781450310987
This paper describes the principles, implementation, and results of a weeklong summer science course for junior high and high school students interested in computer science. To motivate and foster interest and creativity in students, while providing adequate complexity to introduce programming concepts and techniques, we used programming projects in computergraphics as the main learning tool. Included in our discussion are experiences across three course offerings, as well as detailed course assignments.
Efficient collision detection is a requirement for a large number of games. With the release of devices that enable full-body interaction, new challenges arise in this area. In this paper we present a technique for dy...
详细信息
This paper proposes an implementation and optimization of SIFT algorithm for SAR (Synthetic Aperture Radar) images. It improves the SIFT algorithm efficiency using the graphicsprocessing unit (GPU) architecture based...
详细信息
Along with the development of the modern remote sensing technology, the acquired remote sensing image data gets more and more abundant, so the primary obstruction of the application of the remote sensing technology in...
详细信息
Ray tracing is a largely employed technique for generating computerimages with high fidelity and realism. However, this technique is very costly, mainly because of the intersection calculations made by the algorithm....
详细信息
暂无评论