Papers published on a yearly basis
Papers
More filters
•
24 May 2005TL;DR: In this article, a digital camera acquires a first image in a sequence of images by loading it into a unified memory space of the digital camera in a first order and processing it in a second order before the first image is completely processed.
Abstract: A digital camera acquires a first image in a sequence of images by loading it into a unified memory space of the digital camera in a first order and processing it in a second order Before the first image is completely processed, the digital camera starts acquiring a second image and overwriting at least a processed portion of the first image in the unified memory space with image data of the second image
18 citations
•
18 Aug 2010TL;DR: In this article, a method for depth estimation for a digital imaging device is described, which includes detecting a first image associated with a first focus parameter, detecting a second image with a second focus parameter and calculating a statistical representation of a region of interest in the first and second images.
Abstract: A device and methods are provided for calculating depth estimation for a digital imaging device are disclosed and claimed. In one embodiment, a method includes detecting a first image associated with a first focus parameter, detecting a second image associated with a second focus parameter, calculating a statistical representation of a region of interest in the first and second images, and determining a ratio for the region of interest based on the statistical representation. The method may further include determining one or more focus characteristics using a memory table based on the determined ratio for the region of interest, and calculating a focus depth for capture of image data based on the determined one or more focus characteristics associated with the memory table.
18 citations
•
25 Feb 1986TL;DR: In this paper, a semiconductor structure with ohmic contacts and variable resistance contacts has an interconnection pattern to the contacts including a first barrier metal in contact with the variable resist contacts and a second metal contacting the barrier metal and the ohmic contact.
Abstract: A semiconductor structure with ohmic contacts and variable resistance contacts has an interconnection pattern to the contacts including a first barrier metal in contact with the variable resistance contacts and a second metal contacting the barrier metal and the ohmic contacts. The barrier layer protects the amorphotized crystalline structure of the variable resistance contacts. Fabrication processes are described.
17 citations
••
23 Mar 1992TL;DR: An image compression algorithm with a new bit rate control capability is presented that is an extension of the previously developed algorithm and implemented in the Zoran 031 image compression chip set.
Abstract: An image compression algorithm with a new bit rate control capability is presented. The bit rate control technique is developed for use in conjunction with the JPEG baseline image compression algorithm. The new method is an extension of the previously developed algorithm which is implemented in the Zoran 031 image compression chip set. The chip set comprises a discrete cosine transform (DCT) processor and an image compression coder/decoder. Both methods and the chip set are discussed in detail. >
17 citations
•
01 Sep 2000TL;DR: In this article, a method and apparatus for securely accessing digital content is provided, which comprises determining an identification (ID) from a secure medium including content, sending a session key and the ID to a server, if the user is successfully authenticated, receiving the session key from the server to enable reading of the content on the secure medium.
Abstract: A method and apparatus for securely accessing digital content is provided. The method of providing secure access to content comprises determining an identification (ID) from a secure medium including content. The method further comprises sending a session key and the ID to a server. Furthermore, the method includes requesting user authentication and if the user is successfully authenticated, receiving the session key from the server to enable reading of the content on the secure medium.
17 citations
Authors
Showing all 241 results
Name | H-index | Papers | Citations |
---|---|---|---|
Charles K. Chui | 51 | 317 | 17478 |
David Auld | 15 | 22 | 1080 |
Meir Tzur | 13 | 15 | 334 |
Victor Pinto | 13 | 23 | 546 |
Sorin C. Cismas | 9 | 17 | 454 |
Gerard K. Yeh | 9 | 13 | 350 |
Shimon Pertsel | 9 | 11 | 307 |
Itsik Dvir | 9 | 20 | 535 |
Noam Levy | 8 | 12 | 276 |
Nishit Kumar | 8 | 19 | 222 |
Robert Francis Casey | 8 | 17 | 288 |
Guoshen Yu | 8 | 19 | 1063 |
Daniel R. Salmonsen | 7 | 12 | 543 |
Gerard J. Cerchio | 7 | 10 | 565 |
Artemy Baxansky | 7 | 7 | 114 |