نتایج جستجو برای: the mask

تعداد نتایج: 16055843  

2009
Ramesh Raskar

Figure 1 shows an example of a light field camera with a pinhole mask in front of the sensor. If we look at the sensor in 1D and assume an total x-resolution of 900 pixels and a Θ resolution of 9, the local x resolution is 100. The disadvantages are therefore a loss in resolution and a loss of light, as most of the light gets blocked by the mask. Therefore, while this model is very clean on a t...

2001
Philip M. Merikle Eyal M. Reingold

Comparisons of the relative sensitivity of direct and indirect tasks can provide definitive evidence for unconscious memory when the direct and indirect tasks are matched on all characteristics except instructions. To demonstrate unconscious memory in normal adults, subjects first viewed pairs of words and named one cued word in each pair. During the subsequent assessment of memory, new words a...

2002
Victor A. F. Lamme Karl Zipser Henk Spekreijse

& In a backward masking paradigm, a target stimulus is rapidly (<100 msec) followed by a second stimulus. This typically results in a dramatic decrease in the visibility of the target stimulus. It has been shown that masking reduces responses in V1. It is not known, however, which process in V1 is affected by the mask. In the past, we have shown that in V1, modulations of neural activity that a...

2016
Suyog Dutt Jain Kristen Grauman

We present a novel form of interactive video object segmentation where a few clicks by the user helps the system produce a full spatio-temporal segmentation of the object of interest. Whereas conventional interactive pipelines take the user’s initialization as a starting point, we show the value in the system taking the lead even in initialization. In particular, for a given video frame, the sy...

1998
Steve R. Gunn

This paper addresses the problem of determining suitable mask values and sizes for the discrete implementation of the Laplacian of Gaussian edge operator. This is achieved by providing a theoretical connection between the mask size and the edge detection error introduced by truncation of the operator. Additionally, the importance of introducing a bias correction within the finite approximation ...

2011
Arnaldo Câmara

Structured Abstract In this paper, we describe the participation and results of CAUVIS-IME-USP at TRECVID 2011 in instance search pilot task. Briefly, what approach or combination of approaches did you test in each of your submitted runs?  CAUVIS_USP: PHOW descriptor and the bag-of-word approach. What if any significant differences (in terms of what measures) did you find among runs? We submit...

2010
DOMINIC W. MASSARO WENDY L. IDSON

A series of experiments explored the temporal course of the perceived duration of an auditory stimulus. A backward recognition masking paradigm was utilized, in which the subject was to determine which of two target durations was presented on a given trial. The target tone was followed, after a variable silent intertone interval, by a masking tone which could assume one of three possible durati...

Journal: :IACR Cryptology ePrint Archive 2009
D. Canright

This work examines a weakness in re-using masks for masked Galois inversion, specifically in the masked Galois multipliers. Here we show that the mask re-use scheme included in our work[1] cannot result in “perfect masking,” regardless of the order in which the terms are added; explicit distributions are derived for each step. The same problem requires new masks in the subfield calculations, no...

2009
Amir Moradi Thomas Eisenbarth Axel Poschmann Christof Paar

Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic styles such as MDPL and iMDPL, are not sufficient to obfuscate the remaining leakage of single-rail flipflops. By applying simple models for the leakage of masked flip-flops, we design a new attack on circuits implem...

2003
Hanfeng Chen Feihu Qi Su Zhang

In this paper, a supervised video object segmentation algorithm using a small number of interactions is proposed. The proposed algorithm is composed of three steps: semi-automatic first frame segmentation, automatic object tracking and boundary refinement. Homogeneous region segmentation is performed before the user interaction for the first frame to minimize the amount of interaction. Then, a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید