Open Access. Powered by Scholars. Published by Universities.®
- Keyword
- Publication
- File Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Engineering
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Maa & Mmdp: Fall Workshop 2016 With Mid-Michigan Digital Practitioners, Matt Schultz, Annie Benefiel
Matt Schultz
Moving The Digital Curation Needle @Gvsu, Matt Schultz, Kyle Felker
Moving The Digital Curation Needle @Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
Dense Point-Cloud Representation Of A Scene Using Monocular Vision, Yakov Diskin, Vijayan K. Asari
Dense Point-Cloud Representation Of A Scene Using Monocular Vision, Yakov Diskin, Vijayan K. Asari
Vijayan K. Asari
We present a three-dimensional (3-D) reconstruction system designed to support various autonomous navigation applications. The system presented focuses on the 3-D reconstruction of a scene using only a single moving camera. Utilizing video frames captured at different points in time allows us to determine the depths of a scene. In this way, the system can be used to construct a point-cloud model of its unknown surroundings. We present the step-by-step methodology and analysis used in developing the 3-D reconstruction technique. We present a reconstruction framework that generates a primitive point cloud, which is computed based on feature matching and depth …
The Legacy Computer Challenge, Matt Schultz
The Legacy Computer Challenge, Matt Schultz
Matt Schultz
Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker
Joining The Table: Advancing Digital Discussions At Gvsu, Matt Schultz, Kyle Felker
Matt Schultz
An Ontology And Integration Framework For Smart Communities, Steven Ray, Shishir Kinkar, Mark Hennessy
An Ontology And Integration Framework For Smart Communities, Steven Ray, Shishir Kinkar, Mark Hennessy
Steven R Ray
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Mobile Devices: The Case For Cyber Security Hardened Systems, Maurice Dawson, Jorja Wright, Marwan Omar
Maurice Dawson
Mobile devices are becoming a method to provide an efficient and convenient way to access, find and share information; however, the availability of this information has caused an increase in cyber attacks. Currently, cyber threats range from Trojans and viruses to botnets and toolkits. Presently, 96% of mobile devices do not have pre-installed security software while approximately 65% of the vulnerabilities are found within the application layer. This lack in security and policy driven systems is an opportunity for malicious cyber attackers to hack into the various popular devices. Traditional security software found in desktop computing platforms, such as firewalls, …
The Digital Dionysus: Nietzsche & The Network-Centric Condition
The Digital Dionysus: Nietzsche & The Network-Centric Condition
Dan Mellamphy
No abstract provided.